Follow
Patrick McDaniel
Patrick McDaniel
Tsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-Madison
Verified email at cs.wisc.edu - Homepage
Title
Cited by
Cited by
Year
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
W Enck, P Gilbert, S Han, V Tendulkar, BG Chun, LP Cox, J Jung, ...
ACM Transactions on Computer Systems (TOCS) 32 (2), 1-29, 2014
49832014
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
46022016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
38962017
Distillation as a defense to adversarial perturbations against deep neural networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
2016 IEEE symposium on security and privacy (SP), 582-597, 2016
35532016
Ensemble adversarial training: Attacks and defenses
F Tramèr, A Kurakin, N Papernot, I Goodfellow, D Boneh, P McDaniel
arXiv preprint arXiv:1705.07204, 2017
30502017
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
S Arzt, S Rasthofer, C Fritz, E Bodden, A Bartel, J Klein, Y Le Traon, ...
ACM sigplan notices 49 (6), 259-269, 2014
25962014
Transferability in machine learning: from phenomena to black-box attacks using adversarial samples
N Papernot, P McDaniel, I Goodfellow
arXiv preprint arXiv:1605.07277, 2016
19192016
Security and privacy challenges in the smart grid
P McDaniel, S McLaughlin
IEEE security & privacy 7 (3), 75-77, 2009
15352009
On lightweight mobile phone application certification
W Enck, M Ongtang, P McDaniel
Proceedings of the 16th ACM conference on Computer and communications …, 2009
14792009
A study of android application security.
W Enck, D Octeau, PD McDaniel, S Chaudhuri
USENIX security symposium 2 (2), 2011
13842011
Understanding android security
W Enck, M Ongtang, P McDaniel
IEEE security & privacy 7 (1), 50-57, 2009
9762009
On the (statistical) detection of adversarial examples
K Grosse, P Manoharan, N Papernot, M Backes, P McDaniel
arXiv preprint arXiv:1702.06280, 2017
8342017
Secure attribute-based systems
M Pirretti, P Traynor, P McDaniel, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
8162006
Semantically rich application‐centric security in Android
M Ongtang, S McLaughlin, W Enck, P McDaniel
Security and Communication Networks 5 (6), 658-673, 2012
7762012
Iccta: Detecting inter-component privacy leaks in android apps
L Li, A Bartel, TF Bissyandé, J Klein, Y Le Traon, S Arzt, S Rasthofer, ...
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
7592015
Adversarial examples for malware detection
K Grosse, N Papernot, P Manoharan, M Backes, P McDaniel
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
6502017
The space of transferable adversarial examples
F Tramèr, N Papernot, I Goodfellow, D Boneh, P McDaniel
arXiv preprint arXiv:1704.03453, 2017
6062017
Towards the science of security and privacy in machine learning
N Papernot, P McDaniel, A Sinha, M Wellman
arXiv preprint arXiv:1611.03814, 2016
5832016
An analysis of anonymity in bitcoin using p2p network traffic
P Koshy, D Koshy, P McDaniel
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
5822014
Effective {Inter-Component} communication mapping in android: An essential step towards holistic security analysis
D Octeau, P McDaniel, S Jha, A Bartel, E Bodden, J Klein, Y Le Traon
22nd USENIX Security Symposium (USENIX Security 13), 543-558, 2013
5712013
Sok: Security and privacy in machine learning
N Papernot, P McDaniel, A Sinha, MP Wellman
2018 IEEE European symposium on security and privacy (EuroS&P), 399-414, 2018
5522018
Deep k-nearest neighbors: Towards confident, interpretable and robust deep learning
N Papernot, P McDaniel
arXiv preprint arXiv:1803.04765, 2018
5522018
A survey of BGP security issues and solutions
K Butler, TR Farley, P McDaniel, J Rexford
Proceedings of the IEEE 98 (1), 100-122, 2009
5222009
Crafting adversarial input sequences for recurrent neural networks
N Papernot, P McDaniel, A Swami, R Harang
MILCOM 2016-2016 IEEE Military Communications Conference, 49-54, 2016
5032016
Practical black-box attacks against deep learning systems using adversarial examples
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
arXiv preprint arXiv:1602.02697 1 (2), 3, 2016
4972016
Adversarial perturbations against deep neural networks for malware classification
K Grosse, N Papernot, P Manoharan, M Backes, P McDaniel
arXiv preprint arXiv:1606.04435, 2016
4892016
Making machine learning robust against adversarial inputs
I Goodfellow, P McDaniel, N Papernot
Communications of the ACM 61 (7), 56-66, 2018
4272018
Energy theft in the advanced metering infrastructure
S McLaughlin, D Podkuiko, P McDaniel
Critical Information Infrastructures Security: 4th International Workshop …, 2010
4012010
Technical report on the cleverhans v2. 1.0 adversarial examples library
N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ...
arXiv preprint arXiv:1610.00768, 2016
3902016
Working around BGP: an incremental approach to improving security and accuracy in interdomain routing.
G Goodell, W Aiello, T Griffin, J Ioannidis, PD McDaniel, AD Rubin
NDSS 23, 156, 2003
3542003
cleverhans v2. 0.0: an adversarial machine learning library
N Papernot, I Goodfellow, R Sheatsley, R Feinman, P McDaniel
arXiv preprint arXiv:1610.00768 10, 2016
3192016
On cellular botnets: measuring the impact of malicious devices on a cellular network core
P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, P McDaniel, T La Porta
Proceedings of the 16th ACM conference on Computer and communications …, 2009
3132009
Protecting consumer privacy from electric load monitoring
S McLaughlin, P McDaniel, W Aiello
Proceedings of the 18th ACM conference on Computer and communications …, 2011
3112011
Method and system for determining and enforcing security policy in a communication session
P McDaniel, A Prakash
US Patent App. 10/006,552, 2003
3102003
Soteria: Automated {IoT} safety and security analysis
ZB Celik, P McDaniel, G Tan
2018 USENIX annual technical conference (USENIX ATC 18), 147-158, 2018
3022018
Exploiting open functionality in SMS-capable cellular networks
W Enck, P Traynor, P McDaniel, T La Porta
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2992005
Iotguard: Dynamic enforcement of security and safety policy in commodity IoT.
ZB Celik, G Tan, PD McDaniel
NDSS, 2019
2702019
Sensitive information tracking in commodity {IoT}
ZB Celik, L Babun, AK Sikder, H Aksu, G Tan, P McDaniel, AS Uluagac
27th USENIX Security Symposium (USENIX Security 18), 1687-1704, 2018
2692018
Reverse firewall with self-provisioning
WA Aiello, CR Kalmanek Jr, WJ Leighton III, P McDaniel, S Sen, ...
US Patent 8,453,227, 2013
2652013
Privacy preserving clustering
S Jha, L Kruger, P McDaniel
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
2652005
The system can't perform the operation now. Try again later.
Articles 1–40