David A. Wagner
Orcid: 0000-0002-9944-9232Affiliations:
- University of California, Berkeley, CA, USA
According to our database1,
David A. Wagner
authored at least 229 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN.
IEEE Syst. J., June, 2023
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
2022
Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives.
Proc. ACM Hum. Comput. Interact., 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
2021
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
SEAT: Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
CoRR, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
E-ABS: Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image Domains.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019
2018
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples.
Proceedings of the 35th International Conference on Machine Learning, 2018
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples.
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
The effect of developer-specified explanations for permission requests on smartphone user behavior.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 20th Americas Conference on Information Systems, 2014
2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources.
Proceedings of the Symposium On Usable Privacy and Security, 2013
Proceedings of the 11th ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2013
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013
Do Android users write about electric sheep? Examining consumer reviews in Google Play.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Proceedings of the Formal Methods in Computer-Aided Design, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the SPSM'12, 2012
Proceedings of the SPSM'12, 2012
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns.
Proceedings of the SPSM'12, 2012
2011
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 19th International Conference on World Wide Web, 2010
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010
Class properties for security review in an object-capability subset of Java: (short paper).
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
2009
A graph approach to quantitative analysis of control-flow obfuscating transformations.
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009
Conditioned-safe ceremonies and a user study of an application to web authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
login Usenix Mag., 2008
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the Usability, Psychology, and Security, 2008
Proceedings of the 6th USENIX Conference on File and Storage Technologies, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine.
IACR Cryptol. ePrint Arch., 2006
Comput. Secur., 2006
Proceedings of the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, 2006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
2005
A class of polynomially solvable range constraints for interval analysis without widenings.
Theor. Comput. Sci., 2005
IACR Cryptol. ePrint Arch., 2005
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the Model Checking Software, 2005
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the 2005 National Conference on Digital Government Research, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2004
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2003
Ad Hoc Networks, 2003
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Securing Wireless and Mobile Networks - Is It Possible?
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002
Proceedings of the IEEE International Conference on Communications, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Proceedings of the 10th USENIX Security Symposium, 2001
Proceedings of the 10th USENIX Security Symposium, 2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the Static Analysis, 8th International Symposium, 2001
Proceedings of the MOBICOM 2001, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001
2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the Network and Distributed System Security Symposium, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Advances in Cryptology, 2000
Comments on Twofish as an AES Candidate.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
1998
TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web.
First Monday, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
1997
Proceedings of the Security Protocols, 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Proceedings IEEE COMPCON 97, 1997
1996
KD trees and Delaunay-based linear interpolation for function learning: a comparison to neural networks with error backpropagation.
IEEE Trans. Control. Syst. Technol., 1996
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996
Proceedings of the Advances in Cryptology, 1996
1993
A Testbed for Studying Parallel Programs and Parallel Execution Architectures.
Proceedings of the MASCOTS '93, 1993