Practical techniques for searches on encrypted data DX Song, D Wagner, A Perrig Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44-55, 2000 | 4307 | 2000 |
Random key predistribution schemes for sensor networks H Chan, A Perrig, D Song 2003 Symposium on Security and Privacy, 2003., 197-213, 2003 | 4291 | 2003 |
Provable data possession at untrusted stores G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ... Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 3539 | 2007 |
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. J Newsome, DX Song NDSS 5, 3-4, 2005 | 2247 | 2005 |
The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Third international symposium on information processing in sensor networks …, 2004 | 2064 | 2004 |
Android permissions demystified AP Felt, E Chin, S Hanna, D Song, D Wagner Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 1937 | 2011 |
Advances and open problems in federated learning P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ... Foundations and Trends® in Machine Learning 14 (1–2), 1-210, 2021 | 1925 | 2021 |
Robust physical-world attacks on deep learning visual classification K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, C Xiao, A Prakash, ... Proceedings of the IEEE conference on computer vision and pattern …, 2018 | 1856* | 2018 |
Efficient authentication and signing of multicast streams over lossy channels A Perrig, R Canetti, JD Tygar, D Song Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000 | 1378 | 2000 |
Advanced and authenticated marking schemes for IP traceback DX Song, A Perrig Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 1299 | 2001 |
Delving into transferable adversarial examples and black-box attacks Y Liu, X Chen, C Liu, D Song arXiv preprint arXiv:1611.02770, 2016 | 1244 | 2016 |
On scaling decentralized blockchains K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1225 | 2016 |
Polygraph: Automatically generating signatures for polymorphic worms J Newsome, B Karp, D Song 2005 IEEE Symposium on Security and Privacy (S&P'05), 226-241, 2005 | 1210 | 2005 |
SIA: Secure information aggregation in sensor networks B Przydatek, D Song, A Perrig Proceedings of the 1st international conference on Embedded networked sensor …, 2003 | 1095 | 2003 |
Semantics-aware malware detection M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant 2005 IEEE symposium on security and privacy (S&P'05), 32-46, 2005 | 1068 | 2005 |
Panorama: capturing system-wide information flow for malware detection and analysis H Yin, D Song, M Egele, C Kruegel, E Kirda Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 1055 | 2007 |
BitBlaze: A new approach to computer security via binary analysis D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ... International conference on information systems security, 1-25, 2008 | 1000 | 2008 |
Efficient and secure source authentication for multicast A Perrig, R Canetti, D Song, JD Tygar Network and Distributed System Security Symposium, NDSS 1 (2001), 35-46, 2001 | 943 | 2001 |
Privacy-preserving set operations L Kissner, D Song Annual International Cryptology Conference, 241-257, 2005 | 889 | 2005 |
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication M Frank, R Biedert, E Ma, I Martinovic, D Song IEEE transactions on information forensics and security 8 (1), 136-148, 2012 | 865 | 2012 |