Patrick McDaniel Google scholar

Patrick McDaniel Google scholar

Patrick McDaniel William L. Weiss Professor, Computer Science and Engineering, Penn State Unviersity Verified email at cse.psu.edu Christian Szegedy Google Research Verified email at google.com Wojciech Zaremba Co-Founder of OpenAI Verified email at openai.com The ones marked * may be different from the article in the profile.

Predict the Social Influence of Malicious URLs on Social Media.Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains.Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies.Practical Black-Box Attacks against Machine Learning.Attacking strategies and temporal analysis involving Facebook discussion groups.Tracing the Arc of Smartphone Application Security.Feature Cultivation in Privileged Information-augmented Detection.Stealth migration: Hiding virtual machines on the network.Malicious co-residency on the cloud: Attacks and defense.Patient-Driven Privacy Control through Generalized Distillation.Achieving Secure and Differentially Private Computations in Multiparty Settings.Defining and Detecting Environment Discrimination in Android Apps.Adversarial Network Forensics in Software Defined Networking.Adversarial Network Forensics in Software Defined Networking: Demo.On the (Statistical) Detection of Adversarial Examples.Ensemble Adversarial Training: Attacks and Defenses.Achieving Secure and Differentially Private Computations in Multiparty Settings.Composite Constant Propagation and its Application to Android Program Analysis.Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.Cyber Fighter Associate: A Decision Support System for cyber agility.Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols.The Limitations of Deep Learning in Adversarial Settings.Crafting adversarial input sequences for recurrent neural networks.Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.BinDNN: Resilient Function Matching Using Deep Learning.SoK: Lessons Learned from Android Security Research for Appified Software Platforms.Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks.Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples.Towards Least Privilege Containers with Cimplifier.Building Better Detection with Privileged Information.Crafting Adversarial Input Sequences for Recurrent Neural Networks.Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples.Adversarial Perturbations Against Deep Neural Networks for Malware Classification.cleverhans v0.1: an adversarial machine learning library.Towards the Science of Security and Privacy in Machine Learning.Patient-Driven Privacy Control through Generalized Distillation.Composite Constant Propagation: Application to Android Inter-Component Communication Analysis.IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.Measuring the Impact and Perception of Acceptable Advertisements.Enforcing agile access control policies in relational databases using views.Malware traffic detection using tamper resistant features.Adaptive protocol switching using Dynamically Insertable Bumps in the stack.Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering.Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.The Limitations of Deep Learning in Adversarial Settings.TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones.Security Outlook: Six Cyber Game Changers for the Next 15 Years.TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.An Analysis of Anonymity in Bitcoin Using P2P Network Traffic.A Trusted Safety Verifier for Process Controller Code.FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.Duet: library integrity verification for android applications.I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.Semantically rich application-centric security in Android.Hi-Fi: collecting high-fidelity whole-system provenance.Minimizing private data disclosures in the smart grid.ACM Conference on Computer and Communications SecuritySABOT: specification-based payload generation for programmable logic controllers.ACM Conference on Computer and Communications SecurityA Detection Mechanism for SMS Flooding Attacks in Cellular Networks.Protecting consumer privacy from electric load monitoring.ACM Conference on Computer and Communications Security6th USENIX Workshop on Hot Topics in Security, HotSec'11, San Francisco, CA, USA, August 9, 2011.New Security Architectures Based on Emerging Disk Functionality.Not So Great Expectations: Why Application Markets Haven't Failed Security.A logical specification and analysis for SELinux MLS policy.Multi-vendor penetration testing in the advanced metering infrastructure.Porscha: policy oriented secure content handling in Android.ACM Conference on Computer and Communications SecurityConstructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.An architecture for enforcing end-to-end access control over web applications.Towards a Secure and Efficient System for End-to-End Provenance.Embedded Firmware Diversity for Smart Electric Meters.Configuration management at massive scale: system design and experience.Mitigating attacks on open functionality in SMS-capable cellular networks.Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.Justifying Integrity Using a Virtual Machine Verifier.Semantically Rich Application-Centric Security in Android.On cellular botnets: measuring the impact of malicious devices on a cellular network core.ACM Conference on Computer and Communications SecurityOn lightweight mobile phone application certification.ACM Conference on Computer and Communications SecurityEnergy Theft in the Advanced Metering Infrastructure.Exploiting open functionality in SMS-capable cellular networks.Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems.Defending Against Attacks on Main Memory Persistence.ACM Conference on Computer and Communications SecurityRealizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.Establishing and Sustaining System Integrity via Root of Trust Installation.Channels: Runtime System Infrastructure for Security-Typed Languages.Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.Non-volatile memory and disks: avenues for policy architectures.Analysis of the IPv4 Address Space Delegation Structure.Jifclipse: development tools for security-typed languages.A logical specification and analysis for SELinux MLS policy.Configuration Management at Massive Scale: System Design and Experience.From Trusted to Secure: Building and Executing Applications That Enforce System Security.On Attack Causality in Internet-Connected Cellular Networks.Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings.The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.Enforcing provisioning and authorization policy in the Antigone system.Methods and limitations of security policy reconciliation.From Languages to Systems: Understanding Practical Application Development in Security-typed Languages.ACM Conference on Computer and Communications SecurityOptimizing BGP security by exploiting path stability.ACM Conference on Computer and Communications SecurityPassword Exhaustion: Predicting the End of Password Usefulness.Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.Mitigating attacks on open functionality in SMS-capable cellular networks.Enterprise Security: A Community of Interest Based Approach.Trusted declassification: : high-level policy for a security-typed language.Design, implementation and evaluation of security in iSCSI-based network storage systems.Exploiting open functionality in SMS-capable cellular networks.ACM Conference on Computer and Communications SecurityUnderstanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior.Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks.Analysis of Communities of Interest in Data Networks.Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005.Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine.Security Policy Reconciliation in Distributed Computing Environments.Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004.On the performance, feasibility, and use of forward-secure signatures.ACM Conference on Computer and Communications SecurityACM Conference on Computer and Communications SecurityAntigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System.A Flexible Architecture for Security Policy Enforcement.Analysis of security vulnerabilities in the movie production and distribution process.Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.Methods and Limitations of Security Policy Reconciliation.A Response to ''Can We Eliminate Certificate Revocation Lists?

... Patrick McDaniel.

Basketball.

Try again later.The following articles are merged in Scholar. Google Scholar will generate citations using MLA, APA and Chicago styles.

Fitzgerald Writing Style The Great Gatsby, Accenture Media Agency, Supermarket Book Wiki, Congratulations To All Of You, Credentials Meaning In Telugu, The Game Of Life Computer Game 1998, Chinese Space Station Reentry, Michael Holding Commentary Youtube, Paolo Gucci Wife, Cheap Jerseys Soccer, Skechers Flip Flops Goga Max, Online Public School Maryland, Jodi Kantor Family, A Time To Live And A Time To Die (1985), Can Field Crickets Fly, Patagonia Mission Statement, Little Odessa 123movies, Why Bakrid Is Celebrated, Claire Boan Age, Tom McClintock 2020, Aesop Rock - Rogue Wave Lyrics, Probe In A Sentence, Iac Acronym Cloud, Icc Philippines Investigation, Mechanism Of Head Injury, Sse Airtricity Register, Personal Consumption Expenditures Include, Vaping Cost Calculator, Craigslist Madison Cars, Daksh Surname Caste, Has Tommie Lost Her Mind, Lacoste Shoes Online, Synonyms Of Old Pictures, Cruisin Huey Lewis, Kroger Internal Job Postings, San Dimas Waterfall, Janice Dean Weight Loss, Psychodrama Therapy Training, Luis Fonsi ‑ Wikipedia, Jack Baldwin MIT, Swansea Public School Catchment Area, Lethal Bizzle Songs, What Time Is It In Nashville, On Point'' Or En Pointe, Mansfield City School Calendar 2019-2020, Desiree Bachelor Sean, University Of Canada, Allison Holker Net Worth, James Farmer Primary Sources, Photo Of Aaron Lohr, My Nintendo Account Family, Http Pakistan Weather Today By Met Department, Cricket Umpire Level 1 Exam Questions, France Vs Croatia 2018, Priyam Garg Captain, How To Avoid PayPal Fees When Sending Money, 20,000 Streets Under The Sky Bbc Cast, Kitty Hawk Class, Brandon Knight Cowboys, Carney Lansford Hall Of Fame, Goes 17 Goes West, Ritu Nanda Children, My Service Canada, New York Times Health Editor, National Beverage Headquarters, Crockett & Jones, Schlumberger Internship 2020,


Patrick McDaniel Google scholar