Advances and open problems in federated learning P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ... Foundations and trends® in machine learning 14 (1–2), 1-210, 2021 | 6518 | 2021 |
Practical techniques for searches on encrypted data DX Song, D Wagner, A Perrig Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44-55, 2000 | 5239 | 2000 |
Random key predistribution schemes for sensor networks H Chan, A Perrig, D Song 2003 Symposium on Security and Privacy, 2003., 197-213, 2003 | 4445 | 2003 |
Provable data possession at untrusted stores G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ... Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 4098 | 2007 |
Robust physical-world attacks on deep learning visual classification K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, C Xiao, A Prakash, ... Proceedings of the IEEE conference on computer vision and pattern …, 2018 | 3266* | 2018 |
Measuring massive multitask language understanding D Hendrycks, C Burns, S Basart, A Zou, M Mazeika, D Song, J Steinhardt arXiv preprint arXiv:2009.03300, 2020 | 2564 | 2020 |
Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software. J Newsome, DX Song NDSS 5, 3-4, 2005 | 2449 | 2005 |
The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Proceedings of the 3rd international symposium on Information processing in …, 2004 | 2191 | 2004 |
Android permissions demystified AP Felt, E Chin, S Hanna, D Song, D Wagner Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 2149 | 2011 |
Delving into transferable adversarial examples and black-box attacks Y Liu, X Chen, C Liu, D Song arXiv preprint arXiv:1611.02770, 2016 | 2082 | 2016 |
Targeted backdoor attacks on deep learning systems using data poisoning X Chen, C Liu, B Li, K Lu, D Song arXiv preprint arXiv:1712.05526, 2017 | 2015 | 2017 |
Extracting training data from large language models N Carlini, F Tramer, E Wallace, M Jagielski, A Herbert-Voss, K Lee, ... 30th USENIX Security Symposium (USENIX Security 21), 2633-2650, 2021 | 1785 | 2021 |
On Scaling Decentralized Blockchains: (A Position Paper) K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1721 | 2016 |
The many faces of robustness: A critical analysis of out-of-distribution generalization D Hendrycks, S Basart, N Mu, S Kadavath, F Wang, E Dorundo, R Desai, ... Proceedings of the IEEE/CVF international conference on computer vision …, 2021 | 1677 | 2021 |
Natural adversarial examples D Hendrycks, K Zhao, S Basart, J Steinhardt, D Song Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 1516 | 2021 |
Efficient authentication and signing of multicast streams over lossy channels A Perrig, R Canetti, JD Tygar, D Song Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000 | 1452 | 2000 |
Advanced and authenticated marking schemes for IP traceback DX Song, A Perrig Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 1324 | 2001 |
Polygraph: Automatically generating signatures for polymorphic worms J Newsome, B Karp, D Song 2005 IEEE Symposium on Security and Privacy (S&P'05), 226-241, 2005 | 1268 | 2005 |
The secret sharer: Evaluating and testing unintended memorization in neural networks N Carlini, C Liu, Ú Erlingsson, J Kos, D Song 28th USENIX security symposium (USENIX security 19), 267-284, 2019 | 1224 | 2019 |
Semantics-aware malware detection M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant 2005 IEEE symposium on security and privacy (S&P'05), 32-46, 2005 | 1176 | 2005 |