Follow
David Evans
Title
Cited by
Cited by
Year
Advances and Open Problems in Federated Learning
P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ...
arXiv preprint arXiv:1912.04977, 2019
51012019
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
W Xu, D Evans, Y Qi
Network and Distributed Security Symposium (NDSS) 2018, 2018
18842018
Localization for Mobile Sensor Networks
L Hu, D Evans
10th Conference on Mobile Computing and Networking (MobiCom), 2004
15462004
Faster Secure Two-Party Computation Using Garbled Circuits
Y Huang, D Evans, J Katz, L Malka
20th USENIX Security Symposium, 2011
8052011
Using Directional Antennas to Prevent Wormhole Attacks
L Hu, D Evans
Network and Distributed System Security Symposium (NDSS) 2004, 2004
8002004
Improving Security using Extensible Lightweight Static Analysis
D Evans, D Larochelle
IEEE Software 19 (1), 42-51, 2002
7592002
Secure Aggregation for Wireless Networks
L Hu, D Evans
Workshop on Security and Assurance in Ad hoc Networks, 2003
6432003
Statically Detecting Likely Buffer Overflow Vulnerabilities
D Larochelle, D Evans
10th USENIX Security Symposium, 2001
6022001
Automatically Hardening Web Applications using Precise Tainting
A Nguyen-Tuong, S Guarnieri, D Greene, J Shirley, D Evans
IFIP TC11 20th International Conference on Information Security, 2005
5492005
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
S Zahur, M Rosulek, D Evans
Advances in Cryptology-EUROCRYPT 2015, 2015
5452015
Perracotta: Mining Temporal API Rules from Imperfect Traces
J Yang, D Evans, D Bhardwaj, T Bhat, M Das
28th International Conference on Software Engineering (ICSE), 2006
5372006
Automatically Evading Classifiers
W Xu, Y Qi, D Evans
Network and Distributed Systems Symposium (NDSS), 2016
4992016
Evaluating Differentially Private Machine Learning in Practice
B Jayaraman, D Evans
USENIX Security Symposium 2019, 2019
4982019
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Y Huang, D Evans, J Katz
Network and Distributed Security Symposium (NDSS 2012), 2012
4692012
N-Variant Systems: A Secretless Framework for Security through Diversity
B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ...
15th USENIX Security Symposium, 2006
4592006
A Pragmatic Introduction to Secure Multi-Party Computation
D Evans, V Kolesnikov, M Rosulek
NOW Publishers, 2018
3972018
EnviroTrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks
T Abdelzaher, B Blum, Q Cao, Y Chen, D Evans, J George, S George, ...
24th International Conference on Distributed Computing Systems (ICDCS), 2004
3872004
LCLint: A Tool for Using Specifications to Check Code
D Evans, J Guttag, J Horning, YM Tan
ACM SIGSOFT Symposium on the Foundations of Software Engineering 19 (5), 1994
3861994
Reverse-Engineering a Cryptographic RFID Tag
K Nohl, D Evans, Starbug, H Plötz
17th USENIX Security Symposium, 2008
3802008
Static Detection of Dynamic Memory Errors
D Evans
ACM SIGPLAN Conference on Programming Language Design and Implementation …, 1996
3551996
The system can't perform the operation now. Try again later.
Articles 1–20