Obserwuj
Dawn Song
Dawn Song
Professor of Computer Science, UC Berkeley
Zweryfikowany adres z cs.berkeley.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Advances and open problems in federated learning
P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ...
Foundations and trends® in machine learning 14 (1–2), 1-210, 2021
65212021
Practical techniques for searches on encrypted data
DX Song, D Wagner, A Perrig
Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44-55, 2000
52412000
Random key predistribution schemes for sensor networks
H Chan, A Perrig, D Song
2003 Symposium on Security and Privacy, 2003., 197-213, 2003
44452003
Provable data possession at untrusted stores
G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ...
Proceedings of the 14th ACM conference on Computer and communications …, 2007
40982007
Robust physical-world attacks on deep learning visual classification
K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, C Xiao, A Prakash, ...
Proceedings of the IEEE conference on computer vision and pattern …, 2018
3268*2018
Measuring massive multitask language understanding
D Hendrycks, C Burns, S Basart, A Zou, M Mazeika, D Song, J Steinhardt
arXiv preprint arXiv:2009.03300, 2020
25682020
Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software.
J Newsome, DX Song
NDSS 5, 3-4, 2005
24502005
The sybil attack in sensor networks: analysis & defenses
J Newsome, E Shi, D Song, A Perrig
Proceedings of the 3rd international symposium on Information processing in …, 2004
21912004
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
21492011
Delving into transferable adversarial examples and black-box attacks
Y Liu, X Chen, C Liu, D Song
arXiv preprint arXiv:1611.02770, 2016
20822016
Targeted backdoor attacks on deep learning systems using data poisoning
X Chen, C Liu, B Li, K Lu, D Song
arXiv preprint arXiv:1712.05526, 2017
20162017
Extracting training data from large language models
N Carlini, F Tramer, E Wallace, M Jagielski, A Herbert-Voss, K Lee, ...
30th USENIX Security Symposium (USENIX Security 21), 2633-2650, 2021
17912021
On Scaling Decentralized Blockchains: (A Position Paper)
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
17212016
The many faces of robustness: A critical analysis of out-of-distribution generalization
D Hendrycks, S Basart, N Mu, S Kadavath, F Wang, E Dorundo, R Desai, ...
Proceedings of the IEEE/CVF international conference on computer vision …, 2021
16762021
Natural adversarial examples
D Hendrycks, K Zhao, S Basart, J Steinhardt, D Song
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
15172021
Efficient authentication and signing of multicast streams over lossy channels
A Perrig, R Canetti, JD Tygar, D Song
Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000
14522000
Advanced and authenticated marking schemes for IP traceback
DX Song, A Perrig
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
13242001
Polygraph: Automatically generating signatures for polymorphic worms
J Newsome, B Karp, D Song
2005 IEEE Symposium on Security and Privacy (S&P'05), 226-241, 2005
12682005
The secret sharer: Evaluating and testing unintended memorization in neural networks
N Carlini, C Liu, Ú Erlingsson, J Kos, D Song
28th USENIX security symposium (USENIX security 19), 267-284, 2019
12272019
Semantics-aware malware detection
M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant
2005 IEEE symposium on security and privacy (S&P'05), 32-46, 2005
11762005
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20