Follow
David Evans
Title
Cited by
Cited by
Year
Advances and Open Problems in Federated Learning
P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ...
arXiv preprint arXiv:1912.04977, 2019
67242019
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
W Xu, D Evans, Y Qi
Network and Distributed Security Symposium (NDSS) 2018, 2018
21492018
Localization for Mobile Sensor Networks
L Hu, D Evans
10th Conference on Mobile Computing and Networking (MobiCom), 2004
15542004
Faster Secure Two-Party Computation Using Garbled Circuits
Y Huang, D Evans, J Katz, L Malka
20th USENIX Security Symposium, 2011
8382011
Using Directional Antennas to Prevent Wormhole Attacks
L Hu, D Evans
Network and Distributed System Security Symposium (NDSS) 2004, 2004
7982004
Improving Security using Extensible Lightweight Static Analysis
D Evans, D Larochelle
IEEE Software 19 (1), 42-51, 2002
7682002
Secure Aggregation for Wireless Networks
L Hu, D Evans
Workshop on Security and Assurance in Ad hoc Networks, 2003
6592003
Evaluating Differentially Private Machine Learning in Practice
B Jayaraman, D Evans
USENIX Security Symposium 2019, 2019
6052019
Statically Detecting Likely Buffer Overflow Vulnerabilities
D Larochelle, D Evans
10th USENIX Security Symposium, 2001
6052001
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
S Zahur, M Rosulek, D Evans
Advances in Cryptology-EUROCRYPT 2015, 2015
5912015
Automatically Hardening Web Applications using Precise Tainting
A Nguyen-Tuong, S Guarnieri, D Greene, J Shirley, D Evans
IFIP TC11 20th International Conference on Information Security, 2005
5602005
Perracotta: Mining Temporal API Rules from Imperfect Traces
J Yang, D Evans, D Bhardwaj, T Bhat, M Das
28th International Conference on Software Engineering (ICSE), 2006
5452006
Automatically Evading Classifiers
W Xu, Y Qi, D Evans
Network and Distributed Systems Symposium (NDSS), 2016
5252016
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Y Huang, D Evans, J Katz
Network and Distributed Security Symposium (NDSS 2012), 2012
5142012
A Pragmatic Introduction to Secure Multi-Party Computation
D Evans, V Kolesnikov, M Rosulek
NOW Publishers, 2018
5032018
N-Variant Systems: A Secretless Framework for Security through Diversity
B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ...
15th USENIX Security Symposium, 2006
4732006
Reverse-Engineering a Cryptographic RFID Tag
K Nohl, D Evans, Starbug, H Plötz
17th USENIX Security Symposium, 2008
3932008
EnviroTrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks
T Abdelzaher, B Blum, Q Cao, Y Chen, D Evans, J George, S George, ...
24th International Conference on Distributed Computing Systems (ICDCS), 2004
3862004
LCLint: A Tool for Using Specifications to Check Code
D Evans, J Guttag, J Horning, YM Tan
ACM SIGSOFT Symposium on the Foundations of Software Engineering 19 (5), 1994
3861994
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ...
Proceedings on Privacy Enhancing Technologies 2017 (4), 2017
375*2017
The system can't perform the operation now. Try again later.
Articles 1–20