Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
Towards Evaluating the Robustness of Neural Networks
- Nicholas Carlini, D. Wagner
- Computer ScienceIEEE Symposium on Security and Privacy (SP)
- 16 August 2016
TLDR
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
- Anish Athalye, Nicholas Carlini, D. Wagner
- Computer Science, MathematicsICML
- 1 February 2018
TLDR
Practical techniques for searches on encrypted data
- D. Song, D. Wagner, A. Perrig
- Computer Science, MathematicsProceeding IEEE Symposium on Security and…
- 14 May 2000
TLDR
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
- Nicholas Carlini, D. Wagner
- Computer ScienceAISec@CCS
- 20 May 2017
TLDR
TinySec: a link layer security architecture for wireless sensor networks
TLDR
Android permissions demystified
- A. Felt, Erika Chin, Steve Hanna, D. Song, D. Wagner
- Computer ScienceCCS '11
- 17 October 2011
TLDR
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
- Nicholas Carlini, D. Wagner
- Computer ScienceIEEE Security and Privacy Workshops (SPW)
- 5 January 2018
TLDR
Private Circuits: Securing Hardware against Probing Attacks
TLDR
Intercepting mobile communications: the insecurity of 802.11
- N. Borisov, I. Goldberg, D. Wagner
- Computer ScienceMobiCom '01
- 16 July 2001
TLDR
Analyzing inter-application communication in Android
- Erika Chin, A. Felt, K. Greenwood, D. Wagner
- Computer ScienceMobiSys '11
- 28 June 2011
TLDR
...
1
2
3
4
5
...