Ryan Sheatsley

Orcid: 0000-0001-8447-602X

According to our database1, Ryan Sheatsley authored at least 22 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cloud Storage Integrity at Scale: A Case for Dynamic Hash Trees.
CoRR, 2024

ParTEETor: A System for Partial Deployments of TEEs within Tor.
Proceedings of the 23rd Workshop on Privacy in the Electronic Society, 2024

2023
Systematic Evaluation of Geolocation Privacy Mechanisms.
CoRR, 2023

Securing Cloud File Systems using Shielded Execution.
CoRR, 2023

The Space of Adversarial Strategies.
Proceedings of the 32nd USENIX Security Symposium, 2023

Characterizing the Modification Space of Signature IDS Rules.
Proceedings of the IEEE Military Communications Conference, 2023

2022
Building a Privacy-Preserving Smart Camera System.
Proc. Priv. Enhancing Technol., 2022

Adversarial examples for network intrusion detection systems.
J. Comput. Secur., 2022

EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale.
CoRR, 2022

Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices.
CoRR, 2022

Adversarial Plannning.
CoRR, 2022

A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting.
CoRR, 2022

Generating Practical Adversarial Network Traffic Flows Using NIDSGAN.
CoRR, 2022

Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations.
CoRR, 2022

Measuring and Mitigating the Risk of IP Reuse on Public Clouds.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
HoneyModels: Machine Learning Honeypots.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

On the Robustness of Domain Constraints.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Adversarial Examples in Constrained Domains.
CoRR, 2020

2019
Application Transiency: Towards a Fair Trade of Personal Information for Application Services.
Proceedings of the Security and Privacy in Communication Networks, 2019

Curie: Policy-based Secure Data Exchange.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Network Traffic Obfuscation: An Adversarial Machine Learning Approach.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Detection under Privileged Information.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018


  Loading...