Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones W Enck, P Gilbert, S Han, V Tendulkar, BG Chun, LP Cox, J Jung, ... ACM Transactions on Computer Systems (TOCS) 32 (2), 1-29, 2014 | 5015 | 2014 |
The limitations of deep learning in adversarial settings N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami 2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016 | 4727 | 2016 |
Practical black-box attacks against machine learning N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 3993 | 2017 |
Distillation as a defense to adversarial perturbations against deep neural networks N Papernot, P McDaniel, X Wu, S Jha, A Swami 2016 IEEE symposium on security and privacy (SP), 582-597, 2016 | 3630 | 2016 |
Ensemble adversarial training: Attacks and defenses F Tramèr, A Kurakin, N Papernot, I Goodfellow, D Boneh, P McDaniel arXiv preprint arXiv:1705.07204, 2017 | 3129 | 2017 |
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps S Arzt, S Rasthofer, C Fritz, E Bodden, A Bartel, J Klein, Y Le Traon, ... ACM sigplan notices 49 (6), 259-269, 2014 | 2627 | 2014 |
Transferability in machine learning: from phenomena to black-box attacks using adversarial samples N Papernot, P McDaniel, I Goodfellow arXiv preprint arXiv:1605.07277, 2016 | 1963 | 2016 |
Security and privacy challenges in the smart grid P McDaniel, S McLaughlin IEEE security & privacy 7 (3), 75-77, 2009 | 1544 | 2009 |
On lightweight mobile phone application certification W Enck, M Ongtang, P McDaniel Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 1484 | 2009 |
A study of android application security. W Enck, D Octeau, PD McDaniel, S Chaudhuri USENIX security symposium 2 (2), 2011 | 1388 | 2011 |
Understanding android security W Enck, M Ongtang, P McDaniel IEEE security & privacy 7 (1), 50-57, 2009 | 981 | 2009 |
On the (statistical) detection of adversarial examples K Grosse, P Manoharan, N Papernot, M Backes, P McDaniel arXiv preprint arXiv:1702.06280, 2017 | 849 | 2017 |
Secure attribute-based systems M Pirretti, P Traynor, P McDaniel, B Waters Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 823 | 2006 |
Semantically rich application‐centric security in Android M Ongtang, S McLaughlin, W Enck, P McDaniel Security and Communication Networks 5 (6), 658-673, 2012 | 777 | 2012 |
Iccta: Detecting inter-component privacy leaks in android apps L Li, A Bartel, TF Bissyandé, J Klein, Y Le Traon, S Arzt, S Rasthofer, ... 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015 | 770 | 2015 |
Adversarial examples for malware detection K Grosse, N Papernot, P Manoharan, M Backes, P McDaniel Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 668 | 2017 |
The space of transferable adversarial examples F Tramèr, N Papernot, I Goodfellow, D Boneh, P McDaniel arXiv preprint arXiv:1704.03453, 2017 | 615 | 2017 |
Towards the science of security and privacy in machine learning N Papernot, P McDaniel, A Sinha, M Wellman arXiv preprint arXiv:1611.03814, 2016 | 591 | 2016 |
An analysis of anonymity in bitcoin using p2p network traffic P Koshy, D Koshy, P McDaniel Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 588 | 2014 |
Effective {Inter-Component} communication mapping in android: An essential step towards holistic security analysis D Octeau, P McDaniel, S Jha, A Bartel, E Bodden, J Klein, Y Le Traon 22nd USENIX Security Symposium (USENIX Security 13), 543-558, 2013 | 573 | 2013 |