David Evans
Cited by
Cited by
Advances and Open Problems in Federated Learning
P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ...
arXiv preprint arXiv:1912.04977, 2019
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
W Xu, D Evans, Y Qi
Network and Distributed Security Symposium (NDSS) 2018, 2018
Localization for Mobile Sensor Networks
L Hu, D Evans
10th Conference on Mobile Computing and Networking (MobiCom), 2004
Faster Secure Two-Party Computation Using Garbled Circuits
Y Huang, D Evans, J Katz, L Malka
20th USENIX Security Symposium, 2011
Using Directional Antennas to Prevent Wormhole Attacks
L Hu, D Evans
Network and Distributed System Security Symposium (NDSS) 2004, 2004
Improving Security using Extensible Lightweight Static Analysis
D Evans, D Larochelle
IEEE Software 19 (1), 42-51, 2002
Secure Aggregation for Wireless Networks
L Hu, D Evans
Workshop on Security and Assurance in Ad hoc Networks, 2003
Statically Detecting Likely Buffer Overflow Vulnerabilities
D Larochelle, D Evans
10th USENIX Security Symposium, 2001
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
S Zahur, M Rosulek, D Evans
Advances in Cryptology-EUROCRYPT 2015, 2015
Automatically Hardening Web Applications using Precise Tainting
A Nguyen-Tuong, S Guarnieri, D Greene, J Shirley, D Evans
IFIP TC11 20th International Conference on Information Security, 2005
Perracotta: Mining Temporal API Rules from Imperfect Traces
J Yang, D Evans, D Bhardwaj, T Bhat, M Das
28th International Conference on Software Engineering (ICSE), 2006
Evaluating Differentially Private Machine Learning in Practice
B Jayaraman, D Evans
USENIX Security Symposium 2019, 2019
Automatically Evading Classifiers
W Xu, Y Qi, D Evans
Network and Distributed Systems Symposium (NDSS), 2016
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Y Huang, D Evans, J Katz
Network and Distributed Security Symposium (NDSS 2012), 2012
N-Variant Systems: A Secretless Framework for Security through Diversity
B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ...
15th USENIX Security Symposium, 2006
A Pragmatic Introduction to Secure Multi-Party Computation
D Evans, V Kolesnikov, M Rosulek
NOW Publishers, 2018
EnviroTrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks
T Abdelzaher, B Blum, Q Cao, Y Chen, D Evans, J George, S George, ...
24th International Conference on Distributed Computing Systems (ICDCS), 2004
LCLint: A Tool for Using Specifications to Check Code
D Evans, J Guttag, J Horning, YM Tan
ACM SIGSOFT Symposium on the Foundations of Software Engineering 19 (5), 1994
Reverse-Engineering a Cryptographic RFID Tag
K Nohl, D Evans, Starbug, H Pl÷tz
17th USENIX Security Symposium, 2008
Privacy Protection for Social Networking Platforms
A Felt, D Evans
Workshop on Web 2.0 Security and Privacy (W2SP), Oakland, CA, 2008
The system can't perform the operation now. Try again later.
Articles 1–20