Follow
David Evans
Title
Cited by
Cited by
Year
Advances and Open Problems in Federated Learning
P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ...
arXiv preprint arXiv:1912.04977, 2019
62242019
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
W Xu, D Evans, Y Qi
Network and Distributed Security Symposium (NDSS) 2018, 2018
20702018
Localization for Mobile Sensor Networks
L Hu, D Evans
10th Conference on Mobile Computing and Networking (MobiCom), 2004
15482004
Faster Secure Two-Party Computation Using Garbled Circuits
Y Huang, D Evans, J Katz, L Malka
20th USENIX Security Symposium, 2011
8272011
Using Directional Antennas to Prevent Wormhole Attacks
L Hu, D Evans
Network and Distributed System Security Symposium (NDSS) 2004, 2004
7972004
Improving Security using Extensible Lightweight Static Analysis
D Evans, D Larochelle
IEEE Software 19 (1), 42-51, 2002
7632002
Secure Aggregation for Wireless Networks
L Hu, D Evans
Workshop on Security and Assurance in Ad hoc Networks, 2003
6572003
Statically Detecting Likely Buffer Overflow Vulnerabilities
D Larochelle, D Evans
10th USENIX Security Symposium, 2001
6032001
Evaluating Differentially Private Machine Learning in Practice
B Jayaraman, D Evans
USENIX Security Symposium 2019, 2019
5722019
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
S Zahur, M Rosulek, D Evans
Advances in Cryptology-EUROCRYPT 2015, 2015
5712015
Automatically Hardening Web Applications using Precise Tainting
A Nguyen-Tuong, S Guarnieri, D Greene, J Shirley, D Evans
IFIP TC11 20th International Conference on Information Security, 2005
5552005
Perracotta: Mining Temporal API Rules from Imperfect Traces
J Yang, D Evans, D Bhardwaj, T Bhat, M Das
28th International Conference on Software Engineering (ICSE), 2006
5442006
Automatically Evading Classifiers
W Xu, Y Qi, D Evans
Network and Distributed Systems Symposium (NDSS), 2016
5212016
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Y Huang, D Evans, J Katz
Network and Distributed Security Symposium (NDSS 2012), 2012
5002012
N-Variant Systems: A Secretless Framework for Security through Diversity
B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ...
15th USENIX Security Symposium, 2006
4712006
A Pragmatic Introduction to Secure Multi-Party Computation
D Evans, V Kolesnikov, M Rosulek
NOW Publishers, 2018
4682018
Reverse-Engineering a Cryptographic RFID Tag
K Nohl, D Evans, Starbug, H Plötz
17th USENIX Security Symposium, 2008
3892008
EnviroTrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks
T Abdelzaher, B Blum, Q Cao, Y Chen, D Evans, J George, S George, ...
24th International Conference on Distributed Computing Systems (ICDCS), 2004
3852004
LCLint: A Tool for Using Specifications to Check Code
D Evans, J Guttag, J Horning, YM Tan
ACM SIGSOFT Symposium on the Foundations of Software Engineering 19 (5), 1994
3851994
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ...
Proceedings on Privacy Enhancing Technologies 2017 (4), 2017
366*2017
The system can't perform the operation now. Try again later.
Articles 1–20