David Evans
Orcid: 0000-0001-7988-8943Affiliations:
- University of Virginia, Charlottesville, USA
- MIT, Cambridge, MA, USA (PhD 2000)
According to our database1,
David Evans
authored at least 129 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
The Mismeasure of Man and Models: Evaluating Allocational Harms in Large Language Models.
CoRR, 2024
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
2023
CoRR, 2023
Proceedings of the Uncertainty in Artificial Intelligence, 2023
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
2022
ACM Trans. Auton. Adapt. Syst., 2022
Proc. Priv. Enhancing Technol., 2022
Comfortable Cohorts and Tractable Teams: Making Large Computing Theory Courses Feel Small.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022
Balanced Adversarial Training: Balancing Tradeoffs between Fickleness and Obstinacy in NLP Models.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Improved Estimation of Concentration Under ℓp-Norm Distance Metrics Using Half Spaces.
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization.
Proceedings of the 37th International Conference on Machine Learning, 2020
Finding Friends and Flipping Frenemies: Automatic Paraphrase Dataset Augmentation Using Graph Theory.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020
Understanding the Intrinsic Robustness of Image Distributions using Conditional Generative Models.
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics: Student Research Workshop, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the International Symposium on Medical Robotics, 2019
Proceedings of the 7th International Conference on Learning Representations, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Proc. Priv. Enhancing Technol., 2018
Found. Trends Priv. Secur., 2018
Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning.
CoRR, 2018
Distributed Learning without Distress: Privacy-Preserving Empirical Risk Minimization.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Proc. Priv. Enhancing Technol., 2017
CoRR, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
2014
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
2013
IACR Cryptol. ePrint Arch., 2013
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
Proceedings of the Moving Target Defense, 2011
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the 1st Workshop on Social Network Systems, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2006
Secure and practical defense against code-injection attacks using software dynamic translation.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
2005
Proceedings of the Verified Software: Theories, 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Automatically Hardening Web Applications Using Precise Tainting.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
2004
ICSE 2004 workshop summary second international workshop on dynamic analysis (WODA 2004).
ACM SIGSOFT Softw. Eng. Notes, 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 2004 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004
EnviroTrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003
2002
Proceedings of the First Workshop on Self-Healing Systems, 2002
2001
Proceedings of the 10th USENIX Security Symposium, 2001
Proceedings of the RoboCup 2001: Robot Soccer World Cup V, 2001
2000
Proceedings of the Computer-Assisted Information Retrieval (Recherche d'Information et ses Applications), 2000
1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
1996
Bull. dInformatique Approfondie et Appl., 1996
Proceedings of the ACM SIGPLAN'96 Conference on Programming Language Design and Implementation (PLDI), 1996
1994
Proceedings of the Second ACM SIGSOFT Symposium on Foundations of Software Engineering, 1994