Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dawn Song
@article{DBLP:journals/ieeesp/NairROS24, author = {Vivek Nair and Louis B. Rosenberg and James F. O'Brien and Dawn Song}, title = {Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {1}, pages = {24--32}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2023.3330392}, doi = {10.1109/MSEC.2023.3330392}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/NairROS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GarridoNS24, author = {Gonzalo Munilla Garrido and Vivek Nair and Dawn Song}, title = {SoK: Data Privacy in Virtual Reality}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {21--40}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0003}, doi = {10.56553/POPETS-2024-0003}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/GarridoNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-12292, author = {Weixin Chen and Dawn Song and Bo Li}, title = {{GRATH:} Gradual Self-Truthifying for Large Language Models}, journal = {CoRR}, volume = {abs/2401.12292}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.12292}, doi = {10.48550/ARXIV.2401.12292}, eprinttype = {arXiv}, eprint = {2401.12292}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-12292.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-03181, author = {Mintong Kang and Nezihe Merve G{\"{u}}rel and Ning Yu and Dawn Song and Bo Li}, title = {{C-RAG:} Certified Generation Risks for Retrieval-Augmented Language Models}, journal = {CoRR}, volume = {abs/2402.03181}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.03181}, doi = {10.48550/ARXIV.2402.03181}, eprinttype = {arXiv}, eprint = {2402.03181}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-03181.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-12590, author = {Shiyang Lai and Yujin Potter and Junsol Kim and Richard Zhuang and Dawn Song and James Evans}, title = {Evolving {AI} Collectives to Enhance Human Diversity and Enable Self-Regulation}, journal = {CoRR}, volume = {abs/2402.12590}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.12590}, doi = {10.48550/ARXIV.2402.12590}, eprinttype = {arXiv}, eprint = {2402.12590}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-12590.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-07918, author = {Sayash Kapoor and Rishi Bommasani and Kevin Klyman and Shayne Longpre and Ashwin Ramaswami and Peter Cihon and Aspen Hopkins and Kevin Bankston and Stella Biderman and Miranda Bogen and Rumman Chowdhury and Alex Engler and Peter Henderson and Yacine Jernite and Seth Lazar and Stefano Maffulli and Alondra Nelson and Joelle Pineau and Aviya Skowron and Dawn Song and Victor Storchan and Daniel Zhang and Daniel E. Ho and Percy Liang and Arvind Narayanan}, title = {On the Societal Impact of Open Foundation Models}, journal = {CoRR}, volume = {abs/2403.07918}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.07918}, doi = {10.48550/ARXIV.2403.07918}, eprinttype = {arXiv}, eprint = {2403.07918}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-07918.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-10499, author = {Chenguang Wang and Ruoxi Jia and Xin Liu and Dawn Song}, title = {Benchmarking Zero-Shot Robustness of Multimodal Foundation Models: {A} Pilot Study}, journal = {CoRR}, volume = {abs/2403.10499}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.10499}, doi = {10.48550/ARXIV.2403.10499}, eprinttype = {arXiv}, eprint = {2403.10499}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-10499.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-13031, author = {Zhuowen Yuan and Zidi Xiong and Yi Zeng and Ning Yu and Ruoxi Jia and Dawn Song and Bo Li}, title = {RigorLLM: Resilient Guardrails for Large Language Models against Undesired Content}, journal = {CoRR}, volume = {abs/2403.13031}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.13031}, doi = {10.48550/ARXIV.2403.13031}, eprinttype = {arXiv}, eprint = {2403.13031}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-13031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-15447, author = {Junyuan Hong and Jinhao Duan and Chenhui Zhang and Zhangheng Li and Chulin Xie and Kelsey Lieberman and James Diffenderfer and Brian R. Bartoldson and Ajay Jaiswal and Kaidi Xu and Bhavya Kailkhura and Dan Hendrycks and Dawn Song and Zhangyang Wang and Bo Li}, title = {Decoding Compressed Trust: Scrutinizing the Trustworthiness of Efficient LLMs Under Compression}, journal = {CoRR}, volume = {abs/2403.15447}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.15447}, doi = {10.48550/ARXIV.2403.15447}, eprinttype = {arXiv}, eprint = {2403.15447}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-15447.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23, author = {Clark W. Barrett and Brad Boyd and Elie Bursztein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {Found. Trends Priv. Secur.}, volume = {6}, number = {1}, pages = {1--52}, year = {2023}, url = {https://doi.org/10.1561/3300000041}, doi = {10.1561/3300000041}, timestamp = {Sun, 24 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/GoldblumTXCSSML23, author = {Micah Goldblum and Dimitris Tsipras and Chulin Xie and Xinyun Chen and Avi Schwarzschild and Dawn Song and Aleksander Madry and Bo Li and Tom Goldstein}, title = {Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {45}, number = {2}, pages = {1563--1580}, year = {2023}, url = {https://doi.org/10.1109/TPAMI.2022.3162397}, doi = {10.1109/TPAMI.2022.3162397}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/GoldblumTXCSSML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GarridoLMS23, author = {Gonzalo Munilla Garrido and Xiaoyuan Liu and Florian Matthes and Dawn Song}, title = {Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {2}, pages = {151--170}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0045}, doi = {10.56553/POPETS-2023-0045}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GarridoLMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/NairGSO23, author = {Vivek Nair and Gonzalo Munilla Garrido and Dawn Song and James F. O'Brien}, title = {Exploring the Privacy Risks of Adversarial {VR} Game Design}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {238--256}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0108}, doi = {10.56553/POPETS-2023-0108}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/NairGSO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aistats/ZhuWPWJSJ23, author = {Banghua Zhu and Lun Wang and Qi Pang and Shuai Wang and Jiantao Jiao and Dawn Song and Michael I. Jordan}, editor = {Francisco J. R. Ruiz and Jennifer G. Dy and Jan{-}Willem van de Meent}, title = {Byzantine-Robust Federated Learning with Optimal Statistical Rates}, booktitle = {International Conference on Artificial Intelligence and Statistics, 25-27 April 2023, Palau de Congressos, Valencia, Spain}, series = {Proceedings of Machine Learning Research}, volume = {206}, pages = {3151--3178}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v206/zhu23b.html}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aistats/ZhuWPWJSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ChenS023, author = {Weixin Chen and Dawn Song and Bo Li}, title = {TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023}, pages = {4035--4044}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CVPR52729.2023.00393}, doi = {10.1109/CVPR52729.2023.00393}, timestamp = {Mon, 28 Aug 2023 16:14:07 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/ChenS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/NairS23, author = {Vivek Nair and Dawn Song}, title = {Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {56--72}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00013}, doi = {10.1109/EUROSP57164.2023.00013}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/NairS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ErnstbergerLEZSCMGS23, author = {Jens Ernstberger and Jan Lauinger and Fatima Elsheimy and Liyi Zhou and Sebastian Steinhorst and Ran Canetti and Andrew Miller and Arthur Gervais and Dawn Song}, title = {SoK: Data Sovereignty}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {122--143}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00017}, doi = {10.1109/EUROSP57164.2023.00017}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ErnstbergerLEZSCMGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/NairS23, author = {Vivek Nair and Dawn Song}, title = {Decentralizing Custodial Wallets with {MFKDF}}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2023, Dubai, United Arab Emirates, May 1-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICBC56567.2023.10174998}, doi = {10.1109/ICBC56567.2023.10174998}, timestamp = {Fri, 21 Jul 2023 12:10:41 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/NairS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/XiaoCJWNLA0S23, author = {Chaowei Xiao and Zhongzhu Chen and Kun Jin and Jiongxiao Wang and Weili Nie and Mingyan Liu and Anima Anandkumar and Bo Li and Dawn Song}, title = {DensePure: Understanding Diffusion Models for Adversarial Robustness}, booktitle = {The Eleventh International Conference on Learning Representations, {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023}, publisher = {OpenReview.net}, year = {2023}, url = {https://openreview.net/pdf?id=p7hvOJ6Gq0i}, timestamp = {Fri, 30 Jun 2023 14:38:38 +0200}, biburl = {https://dblp.org/rec/conf/iclr/XiaoCJWNLA0S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/LiHS23, author = {Qinbin Li and Bingsheng He and Dawn Song}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Adversarial Collaborative Learning on Non-IID Features}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {19504--19526}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/li23j.html}, timestamp = {Mon, 28 Aug 2023 17:23:08 +0200}, biburl = {https://dblp.org/rec/conf/icml/LiHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/PangWWZS23, author = {Qi Pang and Lun Wang and Shuai Wang and Wenting Zheng and Dawn Song}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Secure Federated Correlation Test and Entropy Estimation}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {26990--27010}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/pang23a.html}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/PangWWZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/Chen000S23, author = {Xuan Chen and Wenbo Guo and Guanhong Tao and Xiangyu Zhang and Dawn Song}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {{BIRD:} Generalizable Backdoor Detection and Removal for Deep Reinforcement Learning}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/802e90325f4c8546e13e5763b2ecab88-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/Chen000S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/KangSL23, author = {Mintong Kang and Dawn Song and Bo Li}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/ea0b28cbbd0cbc45ec4ac38e92da9cb2-Abstract-Conference.html}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/KangSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WangCPXKZXXDSTA23, author = {Boxin Wang and Weixin Chen and Hengzhi Pei and Chulin Xie and Mintong Kang and Chenhui Zhang and Chejian Xu and Zidi Xiong and Ritik Dutta and Rylan Schaeffer and Sang T. Truong and Simran Arora and Mantas Mazeika and Dan Hendrycks and Zinan Lin and Yu Cheng and Sanmi Koyejo and Dawn Song and Bo Li}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {DecodingTrust: {A} Comprehensive Assessment of Trustworthiness in {GPT} Models}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/63cb9921eecf51bfad27a99b2c53dd6d-Abstract-Datasets\_and\_Benchmarks.html}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/WangCPXKZXXDSTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhouXECWWQWSG23, author = {Liyi Zhou and Xihan Xiong and Jens Ernstberger and Stefanos Chaliasos and Zhipeng Wang and Ye Wang and Kaihua Qin and Roger Wattenhofer and Dawn Song and Arthur Gervais}, title = {SoK: Decentralized Finance (DeFi) Attacks}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2444--2461}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179435}, doi = {10.1109/SP46215.2023.10179435}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhouXECWWQWSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uist/NairGS23, author = {Vivek C. Nair and Gonzalo Munilla Garrido and Dawn Song}, editor = {Sean Follmer and Jeff Han and J{\"{u}}rgen Steimle and Nathalie Henry Riche}, title = {Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in {VR}}, booktitle = {Proceedings of the 36th Annual {ACM} Symposium on User Interface Software and Technology, {UIST} 2023, San Francisco, CA, USA, 29 October 2023- 1 November 2023}, pages = {61:1--61:16}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3586183.3606754}, doi = {10.1145/3586183.3606754}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uist/NairGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Nair0MWORS23, author = {Vivek Nair and Wenbo Guo and Justus Mattern and Rui Wang and James F. O'Brien and Louis B. Rosenberg and Dawn Song}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Unique Identification of 50, 000+ Virtual Reality Users from Head {\&} Hand Motion Data}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {895--910}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/nair-identification}, timestamp = {Tue, 26 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Nair0MWORS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NairS23, author = {Vivek Nair and Dawn Song}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Multi-Factor Key Derivation Function {(MFKDF)} for Fast, Flexible, Secure, {\&} Practical Key Management}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2097--2114}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/nair-mfkdf}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/NairS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0002WWXS23, author = {Wenbo Guo and Xian Wu and Lun Wang and Xinyu Xing and Dawn Song}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{PATROL:} Provable Defense against Adversarial Policy in Two-player Games}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3943--3960}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/guo-wenbo}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0002WWXS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/QinCZLSG23, author = {Kaihua Qin and Stefanos Chaliasos and Liyi Zhou and Benjamin Livshits and Dawn Song and Arthur Gervais}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {The Blockchain Imitation Game}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3961--3978}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/qin}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/QinCZLSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RatheeB00S23, author = {Deevashwer Rathee and Anwesh Bhattacharya and Divya Gupta and Rahul Sharma and Dawn Song}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Secure Floating-Point Training}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6329--6346}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/rathee}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RatheeB00S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-05940, author = {Gonzalo Munilla Garrido and Vivek Nair and Dawn Song}, title = {SoK: Data Privacy in Virtual Reality}, journal = {CoRR}, volume = {abs/2301.05940}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.05940}, doi = {10.48550/ARXIV.2301.05940}, eprinttype = {arXiv}, eprint = {2301.05940}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-05940.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-08927, author = {Vivek Nair and Wenbo Guo and Justus Mattern and Rui Wang and James F. O'Brien and Louis B. Rosenberg and Dawn Song}, title = {Unique Identification of 50, 000+ Virtual Reality Users from Head {\&} Hand Motion Data}, journal = {CoRR}, volume = {abs/2302.08927}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.08927}, doi = {10.48550/ARXIV.2302.08927}, eprinttype = {arXiv}, eprint = {2302.08927}, timestamp = {Tue, 26 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-08927.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-05762, author = {Weixin Chen and Dawn Song and Bo Li}, title = {TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets}, journal = {CoRR}, volume = {abs/2303.05762}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.05762}, doi = {10.48550/ARXIV.2303.05762}, eprinttype = {arXiv}, eprint = {2303.05762}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-05762.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-17877, author = {Kaihua Qin and Stefanos Chaliasos and Liyi Zhou and Benjamin Livshits and Dawn Song and Arthur Gervais}, title = {The Blockchain Imitation Game}, journal = {CoRR}, volume = {abs/2303.17877}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.17877}, doi = {10.48550/ARXIV.2303.17877}, eprinttype = {arXiv}, eprint = {2303.17877}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-17877.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-09822, author = {Tanusree Sharma and Yujin Kwon and Kornrapat Pongmala and Henry Wang and Andrew Miller and Dawn Song and Yang Wang}, title = {Unpacking How Decentralized Autonomous Organizations (DAOs) Work in Practice}, journal = {CoRR}, volume = {abs/2304.09822}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.09822}, doi = {10.48550/ARXIV.2304.09822}, eprinttype = {arXiv}, eprint = {2304.09822}, timestamp = {Wed, 09 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-09822.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-12749, author = {Yu Gai and Liyi Zhou and Kaihua Qin and Dawn Song and Arthur Gervais}, title = {Blockchain Large Language Models}, journal = {CoRR}, volume = {abs/2304.12749}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.12749}, doi = {10.48550/ARXIV.2304.12749}, eprinttype = {arXiv}, eprint = {2304.12749}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-12749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-14046, author = {Kaihua Qin and Zhe Ye and Zhun Wang and Weilin Li and Liyi Zhou and Chao Zhang and Dawn Song and Arthur Gervais}, title = {Towards Automated Security Analysis of Smart Contracts based on Execution Property Graph}, journal = {CoRR}, volume = {abs/2305.14046}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.14046}, doi = {10.48550/ARXIV.2305.14046}, eprinttype = {arXiv}, eprint = {2305.14046}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-14046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-15717, author = {Arnav Gudibande and Eric Wallace and Charlie Snell and Xinyang Geng and Hao Liu and Pieter Abbeel and Sergey Levine and Dawn Song}, title = {The False Promise of Imitating Proprietary LLMs}, journal = {CoRR}, volume = {abs/2305.15717}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.15717}, doi = {10.48550/ARXIV.2305.15717}, eprinttype = {arXiv}, eprint = {2305.15717}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-15717.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-19198, author = {Vivek Nair and Christian Rack and Wenbo Guo and Rui Wang and Shuixian Li and Brandon Huang and Atticus Cull and James F. O'Brien and Louis B. Rosenberg and Dawn Song}, title = {Inferring Private Personal Attributes of Virtual Reality Users from Head and Hand Motion Data}, journal = {CoRR}, volume = {abs/2305.19198}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.19198}, doi = {10.48550/ARXIV.2305.19198}, eprinttype = {arXiv}, eprint = {2305.19198}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-19198.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-05007, author = {Jian Liu and Peilun Li and Raymond Cheng and N. Asokan and Dawn Song}, title = {Parallel and Asynchronous Smart Contract Execution}, journal = {CoRR}, volume = {abs/2306.05007}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.05007}, doi = {10.48550/ARXIV.2306.05007}, eprinttype = {arXiv}, eprint = {2306.05007}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-05007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-06459, author = {Vivek Nair and Louis B. Rosenberg and James F. O'Brien and Dawn Song}, title = {Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data}, journal = {CoRR}, volume = {abs/2306.06459}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.06459}, doi = {10.48550/ARXIV.2306.06459}, eprinttype = {arXiv}, eprint = {2306.06459}, timestamp = {Tue, 26 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-06459.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-08168, author = {Vivek Nair and Dawn Song}, title = {Decentralizing Custodial Wallets with {MFKDF}}, journal = {CoRR}, volume = {abs/2306.08168}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.08168}, doi = {10.48550/ARXIV.2306.08168}, eprinttype = {arXiv}, eprint = {2306.08168}, timestamp = {Sun, 18 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-08168.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-08169, author = {Vivek Nair and Dawn Song}, title = {Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance}, journal = {CoRR}, volume = {abs/2306.08169}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.08169}, doi = {10.48550/ARXIV.2306.08169}, eprinttype = {arXiv}, eprint = {2306.08169}, timestamp = {Sun, 18 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-08169.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-11698, author = {Boxin Wang and Weixin Chen and Hengzhi Pei and Chulin Xie and Mintong Kang and Chenhui Zhang and Chejian Xu and Zidi Xiong and Ritik Dutta and Rylan Schaeffer and Sang T. Truong and Simran Arora and Mantas Mazeika and Dan Hendrycks and Zinan Lin and Yu Cheng and Sanmi Koyejo and Dawn Song and Bo Li}, title = {DecodingTrust: {A} Comprehensive Assessment of Trustworthiness in {GPT} Models}, journal = {CoRR}, volume = {abs/2306.11698}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.11698}, doi = {10.48550/ARXIV.2306.11698}, eprinttype = {arXiv}, eprint = {2306.11698}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-11698.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-12338, author = {Isaac David and Liyi Zhou and Kaihua Qin and Dawn Song and Lorenzo Cavallaro and Arthur Gervais}, title = {Do you still need a manual smart contract audit?}, journal = {CoRR}, volume = {abs/2306.12338}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.12338}, doi = {10.48550/ARXIV.2306.12338}, eprinttype = {arXiv}, eprint = {2306.12338}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-12338.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-14746, author = {Vivek Nair and Dawn Song}, title = {{MFDPG:} Multi-Factor Authenticated Password Management With Zero Stored Secrets}, journal = {CoRR}, volume = {abs/2306.14746}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.14746}, doi = {10.48550/ARXIV.2306.14746}, eprinttype = {arXiv}, eprint = {2306.14746}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-14746.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-02106, author = {Yuzheng Hu and Fan Wu and Qinbin Li and Yunhui Long and Gonzalo Munilla Garrido and Chang Ge and Bolin Ding and David A. Forsyth and Bo Li and Dawn Song}, title = {SoK: Privacy-Preserving Data Synthesis}, journal = {CoRR}, volume = {abs/2307.02106}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.02106}, doi = {10.48550/ARXIV.2307.02106}, eprinttype = {arXiv}, eprint = {2307.02106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-02106.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-08912, author = {Pengcheng Fang and Peng Gao and Yun Peng and Qingzhao Zhang and Tao Xie and Dawn Song and Prateek Mittal and Sanjeev R. Kulkarni and Zhuotao Liu and Xusheng Xiao}, title = {{CONTRACTFIX:} {A} Framework for Automatically Fixing Vulnerabilities in Smart Contracts}, journal = {CoRR}, volume = {abs/2307.08912}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.08912}, doi = {10.48550/ARXIV.2307.08912}, eprinttype = {arXiv}, eprint = {2307.08912}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-08912.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-11754, author = {Yujin Kwon and Kornrapat Pongmala and Kaihua Qin and Ariah Klages{-}Mundt and Philipp Jovanovic and Christine A. Parlour and Arthur Gervais and Dawn Song}, title = {What Drives the (In)stability of a Stablecoin?}, journal = {CoRR}, volume = {abs/2307.11754}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.11754}, doi = {10.48550/ARXIV.2307.11754}, eprinttype = {arXiv}, eprint = {2307.11754}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-11754.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14840, author = {Clark W. Barrett and Brad Boyd and Ellie Burzstein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {CoRR}, volume = {abs/2308.14840}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14840}, doi = {10.48550/ARXIV.2308.14840}, eprinttype = {arXiv}, eprint = {2308.14840}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-00430, author = {Vivek Nair and Wenbo Guo and Rui Wang and James F. O'Brien and Louis B. Rosenberg and Dawn Song}, title = {Berkeley Open Extended Reality Recordings 2023 {(BOXRR-23):} 4.7 Million Motion Capture Recordings from 105, 852 Extended Reality Device Users}, journal = {CoRR}, volume = {abs/2310.00430}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.00430}, doi = {10.48550/ARXIV.2310.00430}, eprinttype = {arXiv}, eprint = {2310.00430}, timestamp = {Tue, 26 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-00430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-01405, author = {Andy Zou and Long Phan and Sarah Chen and James Campbell and Phillip Guo and Richard Ren and Alexander Pan and Xuwang Yin and Mantas Mazeika and Ann{-}Kathrin Dombrowski and Shashwat Goel and Nathaniel Li and Michael J. Byun and Zifan Wang and Alex Mallen and Steven Basart and Sanmi Koyejo and Dawn Song and Matt Fredrikson and J. Zico Kolter and Dan Hendrycks}, title = {Representation Engineering: {A} Top-Down Approach to {AI} Transparency}, journal = {CoRR}, volume = {abs/2310.01405}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.01405}, doi = {10.48550/ARXIV.2310.01405}, eprinttype = {arXiv}, eprint = {2310.01405}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-01405.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-03710, author = {Nicholas Crispino and Kyle Montgomery and Fankun Zeng and Dawn Song and Chenguang Wang}, title = {Agent Instructs Large Language Models to be General Zero-Shot Reasoners}, journal = {CoRR}, volume = {abs/2310.03710}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.03710}, doi = {10.48550/ARXIV.2310.03710}, eprinttype = {arXiv}, eprint = {2310.03710}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-03710.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-11865, author = {Qinbin Li and Chulin Xie and Xiaojun Xu and Xiaoyuan Liu and Ce Zhang and Bo Li and Bingsheng He and Dawn Song}, title = {Effective and Efficient Federated Tree Learning on Hybrid Data}, journal = {CoRR}, volume = {abs/2310.11865}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.11865}, doi = {10.48550/ARXIV.2310.11865}, eprinttype = {arXiv}, eprint = {2310.11865}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-11865.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-17688, author = {Yoshua Bengio and Geoffrey E. Hinton and Andrew Yao and Dawn Song and Pieter Abbeel and Yuval Noah Harari and Ya{-}Qin Zhang and Lan Xue and Shai Shalev{-}Shwartz and Gillian K. Hadfield and Jeff Clune and Tegan Maharaj and Frank Hutter and Atilim G{\"{u}}nes Baydin and Sheila A. McIlraith and Qiqi Gao and Ashwin Acharya and David Krueger and Anca D. Dragan and Philip H. S. Torr and Stuart Russell and Daniel Kahneman and Jan Brauner and S{\"{o}}ren Mindermann}, title = {Managing {AI} Risks in an Era of Rapid Progress}, journal = {CoRR}, volume = {abs/2310.17688}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.17688}, doi = {10.48550/ARXIV.2310.17688}, eprinttype = {arXiv}, eprint = {2310.17688}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-17688.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-05090, author = {Vivek Nair and Wenbo Guo and James F. O'Brien and Louis B. Rosenberg and Dawn Song}, title = {Deep Motion Masking for Secure, Usable, and Scalable Real-Time Anonymization of Virtual Reality Motion Data}, journal = {CoRR}, volume = {abs/2311.05090}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.05090}, doi = {10.48550/ARXIV.2311.05090}, eprinttype = {arXiv}, eprint = {2311.05090}, timestamp = {Tue, 26 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-05090.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-11225, author = {Hengzhi Pei and Jinyuan Jia and Wenbo Guo and Bo Li and Dawn Song}, title = {TextGuard: Provable Defense against Backdoor Attacks on Text Classification}, journal = {CoRR}, volume = {abs/2311.11225}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.11225}, doi = {10.48550/ARXIV.2311.11225}, eprinttype = {arXiv}, eprint = {2311.11225}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-11225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-16124, author = {Mintong Kang and Dawn Song and Bo Li}, title = {DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification}, journal = {CoRR}, volume = {abs/2311.16124}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.16124}, doi = {10.48550/ARXIV.2311.16124}, eprinttype = {arXiv}, eprint = {2311.16124}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-16124.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-01511, author = {Yujin Kwon and Ella Corren and Gonzalo Munilla Garrido and Chris Jay Hoofnagle and Dawn Song}, title = {SoK: The Gap Between Data Rights Ideals and Reality}, journal = {CoRR}, volume = {abs/2312.01511}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.01511}, doi = {10.48550/ARXIV.2312.01511}, eprinttype = {arXiv}, eprint = {2312.01511}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-01511.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RatheeBGSS23, author = {Deevashwer Rathee and Anwesh Bhattacharya and Divya Gupta and Rahul Sharma and Dawn Song}, title = {Secure Floating-Point Training}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2023}, url = {https://eprint.iacr.org/2023/467}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RatheeBGSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaiZQSG23, author = {Yu Gai and Liyi Zhou and Kaihua Qin and Dawn Song and Arthur Gervais}, title = {Blockchain Large Language Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2023}, url = {https://eprint.iacr.org/2023/592}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaiZQSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ErnstbergerLEZSCMGS23, author = {Jens Ernstberger and Jan Lauinger and Fatima Elsheimy and Liyi Zhou and Sebastian Steinhorst and Ran Canetti and Andrew Miller and Arthur Gervais and Dawn Song}, title = {SoK: Data Sovereignty}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {967}, year = {2023}, url = {https://eprint.iacr.org/2023/967}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ErnstbergerLEZSCMGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuXZSZ23, author = {Tianyi Liu and Tiancheng Xie and Jiaheng Zhang and Dawn Song and Yupeng Zhang}, title = {Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1271}, year = {2023}, url = {https://eprint.iacr.org/2023/1271}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuXZSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSHBQWLSM23, author = {Yunqi Li and Kyle Soska and Zhen Huang and Sylvain Bellemare and Mikerah Quintyne{-}Collins and Lun Wang and Xiaoyuan Liu and Dawn Song and Andrew Miller}, title = {Ratel: MPC-extensions for Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1909}, year = {2023}, url = {https://eprint.iacr.org/2023/1909}, timestamp = {Tue, 16 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiSHBQWLSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BarrosoCGOPSP22, author = {Luiz Andr{\'{e}} Barroso and Tanzeem Choudhury and Manish Gupta and Oyekunle A. Olukotun and Raluca Ada Popa and Dawn Xiaodong Song and David A. Patterson}, title = {Global perspectives of diversity, equity, and inclusion}, journal = {Commun. {ACM}}, volume = {65}, number = {12}, pages = {30--31}, year = {2022}, url = {https://doi.org/10.1145/3548454}, doi = {10.1145/3548454}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BarrosoCGOPSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LiuLCAS22, author = {Jian Liu and Peilun Li and Raymond Cheng and N. Asokan and Dawn Song}, title = {Parallel and Asynchronous Smart Contract Execution}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {33}, number = {5}, pages = {1097--1108}, year = {2022}, url = {https://doi.org/10.1109/TPDS.2021.3095234}, doi = {10.1109/TPDS.2021.3095234}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/LiuLCAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/WangLCH0S22, author = {Chenguang Wang and Xiao Liu and Zui Chen and Haoyun Hong and Jie Tang and Dawn Song}, editor = {Smaranda Muresan and Preslav Nakov and Aline Villavicencio}, title = {DeepStruct: Pretraining of Language Models for Structure Prediction}, booktitle = {Findings of the Association for Computational Linguistics: {ACL} 2022, Dublin, Ireland, May 22-27, 2022}, pages = {803--823}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.findings-acl.67}, doi = {10.18653/V1/2022.FINDINGS-ACL.67}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/WangLCH0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/PanXHYPSLLS22, author = {Xinlei Pan and Chaowei Xiao and Warren He and Shuang Yang and Jian Peng and Mingjie Sun and Mingyan Liu and Bo Li and Dawn Song}, editor = {Piotr Faliszewski and Viviana Mascardi and Catherine Pelachaud and Matthew E. Taylor}, title = {Characterizing Attacks on Deep Reinforcement Learning}, booktitle = {21st International Conference on Autonomous Agents and Multiagent Systems, {AAMAS} 2022, Auckland, New Zealand, May 9-13, 2022}, pages = {1010--1018}, publisher = {International Foundation for Autonomous Agents and Multiagent Systems {(IFAAMAS)}}, year = {2022}, url = {https://www.ifaamas.org/Proceedings/aamas2022/pdfs/p1010.pdf}, doi = {10.5555/3535850.3535963}, timestamp = {Mon, 18 Jul 2022 17:13:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/PanXHYPSLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeCTLGVVSSA22, author = {Dayeol Lee and Kevin Cheang and Alexander Thomas and Catherine Lu and Pranav Gaddamadugu and Anjo Vahldiek{-}Oberwagner and Mona Vij and Dawn Song and Sanjit A. Seshia and Krste Asanovic}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Cerberus: {A} Formal Approach to Secure and Efficient Enclave Memory Sharing}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1871--1885}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560595}, doi = {10.1145/3548606.3560595}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeeCTLGVVSSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XieZCZ0JBS22, author = {Tiancheng Xie and Jiaheng Zhang and Zerui Cheng and Fan Zhang and Yupeng Zhang and Yongzheng Jia and Dan Boneh and Dawn Song}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {zkBridge: Trustless Cross-chain Bridges Made Practical}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3003--3017}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560652}, doi = {10.1145/3548606.3560652}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XieZCZ0JBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SoaresSV22, author = {Jorge M. Soares and Dawn Song and Marko Vukolic}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {ConsensusDay '22: {ACM} Workshop on Developments in Consensus}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3543--3544}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563286}, doi = {10.1145/3548606.3563286}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SoaresSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coling/Shen0GS22, author = {Jianhao Shen and Chenguang Wang and Linyuan Gong and Dawn Song}, editor = {Nicoletta Calzolari and Chu{-}Ren Huang and Hansaem Kim and James Pustejovsky and Leo Wanner and Key{-}Sun Choi and Pum{-}Mo Ryu and Hsin{-}Hsi Chen and Lucia Donatelli and Heng Ji and Sadao Kurohashi and Patrizia Paggio and Nianwen Xue and Seokhwan Kim and Younggyun Hahm and Zhong He and Tony Kyungil Lee and Enrico Santus and Francis Bond and Seung{-}Hoon Na}, title = {Joint Language Semantic and Structure Embedding for Knowledge Graph Completion}, booktitle = {Proceedings of the 29th International Conference on Computational Linguistics, {COLING} 2022, Gyeongju, Republic of Korea, October 12-17, 2022}, pages = {1965--1978}, publisher = {International Committee on Computational Linguistics}, year = {2022}, url = {https://aclanthology.org/2022.coling-1.171}, timestamp = {Thu, 13 Oct 2022 17:29:38 +0200}, biburl = {https://dblp.org/rec/conf/coling/Shen0GS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/XieZS22, author = {Tiancheng Xie and Yupeng Zhang and Dawn Song}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Orion: Zero Knowledge Proof with Linear Prover Time}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {299--328}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_11}, doi = {10.1007/978-3-031-15985-5\_11}, timestamp = {Wed, 19 Oct 2022 17:37:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/XieZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/HendrycksZMTLSS22, author = {Dan Hendrycks and Andy Zou and Mantas Mazeika and Leonard Tang and Bo Li and Dawn Song and Jacob Steinhardt}, title = {PixMix: Dreamlike Pictures Comprehensively Improve Safety Measures}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {16762--16771}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01628}, doi = {10.1109/CVPR52688.2022.01628}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/HendrycksZMTLSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/ShenCWSS22, author = {Da Shen and Xinyun Chen and Chenguang Wang and Koushik Sen and Dawn Song}, editor = {Yoav Goldberg and Zornitsa Kozareva and Yue Zhang}, title = {Benchmarking Language Models for Code Syntax Understanding}, booktitle = {Findings of the Association for Computational Linguistics: {EMNLP} 2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022}, pages = {3071--3093}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.findings-emnlp.224}, doi = {10.18653/V1/2022.FINDINGS-EMNLP.224}, timestamp = {Sat, 03 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/ShenCWSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/ShenWYHJS0S22, author = {Jianhao Shen and Chenguang Wang and Ye Yuan and Jiawei Han and Heng Ji and Koushik Sen and Ming Zhang and Dawn Song}, editor = {Yoav Goldberg and Zornitsa Kozareva and Yue Zhang}, title = {{PALT:} Parameter-Lite Transfer of Language Models for Knowledge Graph Completion}, booktitle = {Findings of the Association for Computational Linguistics: {EMNLP} 2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022}, pages = {3833--3847}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.findings-emnlp.281}, doi = {10.18653/V1/2022.FINDINGS-EMNLP.281}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/ShenWYHJS0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/0001LS22, author = {Chenguang Wang and Xiao Liu and Dawn Song}, editor = {Yoav Goldberg and Zornitsa Kozareva and Yue Zhang}, title = {{IELM:} An Open Information Extraction Benchmark for Pre-Trained Language Models}, booktitle = {Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022}, pages = {8417--8437}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.emnlp-main.576}, doi = {10.18653/V1/2022.EMNLP-MAIN.576}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/0001LS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/WangPS22, author = {Lun Wang and Iosif Pinelis and Dawn Song}, title = {Differentially Private Fractional Frequency Moments Estimation with Polylogarithmic Space}, booktitle = {The Tenth International Conference on Learning Representations, {ICLR} 2022, Virtual Event, April 25-29, 2022}, publisher = {OpenReview.net}, year = {2022}, url = {https://openreview.net/forum?id=7I8LPkcx8V}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/WangPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/HendrycksBMZKMS22, author = {Dan Hendrycks and Steven Basart and Mantas Mazeika and Andy Zou and Joseph Kwon and Mohammadreza Mostajabi and Jacob Steinhardt and Dawn Song}, editor = {Kamalika Chaudhuri and Stefanie Jegelka and Le Song and Csaba Szepesv{\'{a}}ri and Gang Niu and Sivan Sabato}, title = {Scaling Out-of-Distribution Detection for Real-World Settings}, booktitle = {International Conference on Machine Learning, {ICML} 2022, 17-23 July 2022, Baltimore, Maryland, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {162}, pages = {8759--8773}, publisher = {{PMLR}}, year = {2022}, url = {https://proceedings.mlr.press/v162/hendrycks22a.html}, timestamp = {Tue, 12 Jul 2022 17:36:52 +0200}, biburl = {https://dblp.org/rec/conf/icml/HendrycksBMZKMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/MazeikaTZBCSFSH22, author = {Mantas Mazeika and Eric Tang and Andy Zou and Steven Basart and Jun Shern Chan and Dawn Song and David A. Forsyth and Jacob Steinhardt and Dan Hendrycks}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {How Would The Viewer Feel? Estimating Wellbeing From Video Scenarios}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/75ff01252ab45ce278cb060effce4ca1-Abstract-Datasets\_and\_Benchmarks.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/MazeikaTZBCSFSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ZouXJKMLSSEH22, author = {Andy Zou and Tristan Xiao and Ryan Jia and Joe Kwon and Mantas Mazeika and Richard Li and Dawn Song and Jacob Steinhardt and Owain Evans and Dan Hendrycks}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {Forecasting Future World Events With Neural Networks}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/aec870a6772336c15dac992c16f2e7c9-Abstract-Datasets\_and\_Benchmarks.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/ZouXJKMLSSEH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenWPS0JM0S22, author = {Jialuo Chen and Jingyi Wang and Tinglan Peng and Youcheng Sun and Peng Cheng and Shouling Ji and Xingjun Ma and Bo Li and Dawn Song}, title = {Copy, Right? {A} Testing Framework for Copyright Protection of Deep Learning Models}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {824--841}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833747}, doi = {10.1109/SP46214.2022.9833747}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChenWPS0JM0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uai/MainiCLS22, author = {Pratyush Maini and Xinyun Chen and Bo Li and Dawn Song}, editor = {James Cussens and Kun Zhang}, title = {Perturbation type categorization for multiple adversarial perturbation robustness}, booktitle = {Uncertainty in Artificial Intelligence, Proceedings of the Thirty-Eighth Conference on Uncertainty in Artificial Intelligence, {UAI} 2022, 1-5 August 2022, Eindhoven, The Netherlands}, series = {Proceedings of Machine Learning Research}, volume = {180}, pages = {1317--1327}, publisher = {{PMLR}}, year = {2022}, url = {https://proceedings.mlr.press/v180/maini22a.html}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uai/MainiCLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangKNPSS0LS22, author = {Lun Wang and Usmann Khan and Joseph P. Near and Qi Pang and Jithendaraa Subramanian and Neel Somani and Peng Gao and Andrew Low and Dawn Song}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {PrivGuard: Privacy Regulation Compliance Made Easier}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3753--3770}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/wang-lun}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WangKNPSS0LS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/consensusday/2022, editor = {Jorge M. Soares and Dawn Song and Marko Vukolic}, title = {Proceedings of the 2022 {ACM} Workshop on Developments in Consensus, ConsensusDay 2022, Los Angeles, CA, USA, 7 November 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560829}, doi = {10.1145/3560829}, isbn = {978-1-4503-9879-4}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/consensusday/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-07920, author = {Bennet Yee and Dawn Song and Patrick McCorry and Chris Buckland}, title = {Shades of Finality and Layer 2 Scaling}, journal = {CoRR}, volume = {abs/2201.07920}, year = {2022}, url = {https://arxiv.org/abs/2201.07920}, eprinttype = {arXiv}, eprint = {2201.07920}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-07920.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-07147, author = {Sarah E. Chasins and Alvin Cheung and Natacha Crooks and Ali Ghodsi and Ken Goldberg and Joseph E. Gonzalez and Joseph M. Hellerstein and Michael I. Jordan and Anthony D. Joseph and Michael W. Mahoney and Aditya G. Parameswaran and David A. Patterson and Raluca Ada Popa and Koushik Sen and Scott Shenker and Dawn Song and Ion Stoica}, title = {The Sky Above The Clouds}, journal = {CoRR}, volume = {abs/2205.07147}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.07147}, doi = {10.48550/ARXIV.2205.07147}, eprinttype = {arXiv}, eprint = {2205.07147}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-07147.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-10475, author = {Chenguang Wang and Xiao Liu and Zui Chen and Haoyun Hong and Jie Tang and Dawn Song}, title = {DeepStruct: Pretraining of Language Models for Structure Prediction}, journal = {CoRR}, volume = {abs/2205.10475}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.10475}, doi = {10.48550/ARXIV.2205.10475}, eprinttype = {arXiv}, eprint = {2205.10475}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-10475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-11765, author = {Banghua Zhu and Lun Wang and Qi Pang and Shuai Wang and Jiantao Jiao and Dawn Song and Michael I. Jordan}, title = {Byzantine-Robust Federated Learning with Optimal Statistical Rates and Privacy Guarantees}, journal = {CoRR}, volume = {abs/2205.11765}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.11765}, doi = {10.48550/ARXIV.2205.11765}, eprinttype = {arXiv}, eprint = {2205.11765}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-11765.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-15474, author = {Andy Zou and Tristan Xiao and Ryan Jia and Joe Kwon and Mantas Mazeika and Richard Li and Dawn Song and Jacob Steinhardt and Owain Evans and Dan Hendrycks}, title = {Forecasting Future World Events with Neural Networks}, journal = {CoRR}, volume = {abs/2206.15474}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.15474}, doi = {10.48550/ARXIV.2206.15474}, eprinttype = {arXiv}, eprint = {2206.15474}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-15474.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-09087, author = {Yuzheng Hu and Tianle Cai and Jinyong Shan and Shange Tang and Chaochao Cai and Ethan Song and Bo Li and Dawn Song}, title = {Is Vertical Logistic Regression Privacy-Preserving? {A} Comprehensive Privacy Analysis and Beyond}, journal = {CoRR}, volume = {abs/2207.09087}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.09087}, doi = {10.48550/ARXIV.2207.09087}, eprinttype = {arXiv}, eprint = {2207.09087}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-09087.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-10308, author = {Xiaoyuan Liu and Tianneng Shi and Chulin Xie and Qinbin Li and Kangping Hu and Haoyu Kim and Xiaojun Xu and Bo Li and Dawn Song}, title = {UniFed: {A} Benchmark for Federated Learning Frameworks}, journal = {CoRR}, volume = {abs/2207.10308}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.10308}, doi = {10.48550/ARXIV.2207.10308}, eprinttype = {arXiv}, eprint = {2207.10308}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-10308.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-13176, author = {Vivek Nair and Gonzalo Munilla Garrido and Dawn Song}, title = {Exploring the Unprecedented Privacy Risks of the Metaverse}, journal = {CoRR}, volume = {abs/2207.13176}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.13176}, doi = {10.48550/ARXIV.2207.13176}, eprinttype = {arXiv}, eprint = {2207.13176}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-13176.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-05586, author = {Vivek Nair and Dawn Song}, title = {Multi-Factor Key Derivation Function {(MFKDF)}}, journal = {CoRR}, volume = {abs/2208.05586}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.05586}, doi = {10.48550/ARXIV.2208.05586}, eprinttype = {arXiv}, eprint = {2208.05586}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-05586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-05604, author = {Vivek Nair and Gonzalo Munilla Garrido and Dawn Song}, title = {Going Incognito in the Metaverse}, journal = {CoRR}, volume = {abs/2208.05604}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.05604}, doi = {10.48550/ARXIV.2208.05604}, eprinttype = {arXiv}, eprint = {2208.05604}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-05604.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-13035, author = {Liyi Zhou and Xihan Xiong and Jens Ernstberger and Stefanos Chaliasos and Zhipeng Wang and Ye Wang and Kaihua Qin and Roger Wattenhofer and Dawn Song and Arthur Gervais}, title = {SoK: Decentralized Finance (DeFi) Incidents}, journal = {CoRR}, volume = {abs/2208.13035}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.13035}, doi = {10.48550/ARXIV.2208.13035}, eprinttype = {arXiv}, eprint = {2208.13035}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-13035.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-08721, author = {Jianhao Shen and Chenguang Wang and Linyuan Gong and Dawn Song}, title = {Joint Language Semantic and Structure Embedding for Knowledge Graph Completion}, journal = {CoRR}, volume = {abs/2209.08721}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.08721}, doi = {10.48550/ARXIV.2209.08721}, eprinttype = {arXiv}, eprint = {2209.08721}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-08721.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-15253, author = {Dayeol Lee and Kevin Cheang and Alexander Thomas and Catherine Lu and Pranav Gaddamadugu and Anjo Vahldiek{-}Oberwagner and Mona Vij and Dawn Song and Sanjit A. Seshia and Krste Asanovic}, title = {Cerberus: {A} Formal Approach to Secure and Efficient Enclave Memory Sharing}, journal = {CoRR}, volume = {abs/2209.15253}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.15253}, doi = {10.48550/ARXIV.2209.15253}, eprinttype = {arXiv}, eprint = {2209.15253}, timestamp = {Thu, 06 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-15253.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-00264, author = {Tiancheng Xie and Jiaheng Zhang and Zerui Cheng and Fan Zhang and Yupeng Zhang and Yongzheng Jia and Dan Boneh and Dawn Song}, title = {zkBridge: Trustless Cross-chain Bridges Made Practical}, journal = {CoRR}, volume = {abs/2210.00264}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.00264}, doi = {10.48550/ARXIV.2210.00264}, eprinttype = {arXiv}, eprint = {2210.00264}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-00264.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-10039, author = {Mantas Mazeika and Eric Tang and Andy Zou and Steven Basart and Jun Shern Chan and Dawn Song and David A. Forsyth and Jacob Steinhardt and Dan Hendrycks}, title = {How Would The Viewer Feel? Estimating Wellbeing From Video Scenarios}, journal = {CoRR}, volume = {abs/2210.10039}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.10039}, doi = {10.48550/ARXIV.2210.10039}, eprinttype = {arXiv}, eprint = {2210.10039}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-10039.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-13715, author = {Jianhao Shen and Chenguang Wang and Ye Yuan and Jiawei Han and Heng Ji and Koushik Sen and Ming Zhang and Dawn Song}, title = {{PALT:} Parameter-Lite Transfer of Language Models for Knowledge Graph Completion}, journal = {CoRR}, volume = {abs/2210.13715}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.13715}, doi = {10.48550/ARXIV.2210.13715}, eprinttype = {arXiv}, eprint = {2210.13715}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-13715.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-14128, author = {Chenguang Wang and Xiao Liu and Dawn Song}, title = {{IELM:} An Open Information Extraction Benchmark for Pre-Trained Language Models}, journal = {CoRR}, volume = {abs/2210.14128}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.14128}, doi = {10.48550/ARXIV.2210.14128}, eprinttype = {arXiv}, eprint = {2210.14128}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-14128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-14473, author = {Da Shen and Xinyun Chen and Chenguang Wang and Koushik Sen and Dawn Song}, title = {Benchmarking Language Models for Code Syntax Understanding}, journal = {CoRR}, volume = {abs/2210.14473}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.14473}, doi = {10.48550/ARXIV.2210.14473}, eprinttype = {arXiv}, eprint = {2210.14473}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-14473.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-00322, author = {Chaowei Xiao and Zhongzhu Chen and Kun Jin and Jiongxiao Wang and Weili Nie and Mingyan Liu and Anima Anandkumar and Bo Li and Dawn Song}, title = {DensePure: Understanding Diffusion Models towards Adversarial Robustness}, journal = {CoRR}, volume = {abs/2211.00322}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.00322}, doi = {10.48550/ARXIV.2211.00322}, eprinttype = {arXiv}, eprint = {2211.00322}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-00322.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-03898, author = {Gonzalo Munilla Garrido and Xiaoyuan Liu and Florian Matthes and Dawn Song}, title = {Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry}, journal = {CoRR}, volume = {abs/2211.03898}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.03898}, doi = {10.48550/ARXIV.2211.03898}, eprinttype = {arXiv}, eprint = {2211.03898}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-03898.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-05219, author = {Zhe Ye and Ujval Misra and Dawn Song}, title = {Specular: Towards Trust-minimized Blockchain Execution Scalability with EVM-native Fraud Proofs}, journal = {CoRR}, volume = {abs/2212.05219}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.05219}, doi = {10.48550/ARXIV.2212.05219}, eprinttype = {arXiv}, eprint = {2212.05219}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-05219.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-10388, author = {Peng Gao and Xiaoyuan Liu and Edward Choi and Sibo Ma and Xinyu Yang and Zhengjie Ji and Zilin Zhang and Dawn Song}, title = {ThreatKG: {A} Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management}, journal = {CoRR}, volume = {abs/2212.10388}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.10388}, doi = {10.48550/ARXIV.2212.10388}, eprinttype = {arXiv}, eprint = {2212.10388}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-10388.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xie0S22, author = {Tiancheng Xie and Yupeng Zhang and Dawn Song}, title = {Orion: Zero Knowledge Proof with Linear Prover Time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1010}, year = {2022}, url = {https://eprint.iacr.org/2022/1010}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xie0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RatheePXCS22, author = {Deevashwer Rathee and Guru{-}Vamsi Policharla and Tiancheng Xie and Ryan Cottone and Dawn Song}, title = {{ZEBRA:} Anonymous Credentials with Practical On-chain Verification and Applications to {KYC} in DeFi}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1286}, year = {2022}, url = {https://eprint.iacr.org/2022/1286}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RatheePXCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouXECWWQWSG22, author = {Liyi Zhou and Xihan Xiong and Jens Ernstberger and Stefanos Chaliasos and Zhipeng Wang and Ye Wang and Kaihua Qin and Roger Wattenhofer and Dawn Song and Arthur Gervais}, title = {SoK: Decentralized Finance (DeFi) Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1773}, year = {2022}, url = {https://eprint.iacr.org/2022/1773}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhouXECWWQWSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftml/KairouzMABBBBCC21, author = {Peter Kairouz and H. Brendan McMahan and Brendan Avent and Aur{\'{e}}lien Bellet and Mehdi Bennis and Arjun Nitin Bhagoji and Kallista A. Bonawitz and Zachary Charles and Graham Cormode and Rachel Cummings and Rafael G. L. D'Oliveira and Hubert Eichner and Salim El Rouayheb and David Evans and Josh Gardner and Zachary Garrett and Adri{\`{a}} Gasc{\'{o}}n and Badih Ghazi and Phillip B. Gibbons and Marco Gruteser and Za{\"{\i}}d Harchaoui and Chaoyang He and Lie He and Zhouyuan Huo and Ben Hutchinson and Justin Hsu and Martin Jaggi and Tara Javidi and Gauri Joshi and Mikhail Khodak and Jakub Kone{\v{c}}n{\'y} and Aleksandra Korolova and Farinaz Koushanfar and Sanmi Koyejo and Tancr{\`{e}}de Lepoint and Yang Liu and Prateek Mittal and Mehryar Mohri and Richard Nock and Ayfer {\"{O}}zg{\"{u}}r and Rasmus Pagh and Hang Qi and Daniel Ramage and Ramesh Raskar and Mariana Raykova and Dawn Song and Weikang Song and Sebastian U. Stich and Ziteng Sun and Ananda Theertha Suresh and Florian Tram{\`{e}}r and Praneeth Vepakomma and Jianyu Wang and Li Xiong and Zheng Xu and Qiang Yang and Felix X. Yu and Han Yu and Sen Zhao}, title = {Advances and Open Problems in Federated Learning}, journal = {Found. Trends Mach. Learn.}, volume = {14}, number = {1-2}, pages = {1--210}, year = {2021}, url = {https://doi.org/10.1561/2200000083}, doi = {10.1561/2200000083}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftml/KairouzMABBBBCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/WangWWLZSJ21, author = {Wenxiao Wang and Tianhao Wang and Lun Wang and Nanqing Luo and Pan Zhou and Dawn Song and Ruoxi Jia}, title = {DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {4}, pages = {163--183}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0065}, doi = {10.2478/POPETS-2021-0065}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/WangWWLZSJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/ChenGCS20, author = {Xinyun Chen and Linyuan Gong and Alvin Cheung and Dawn Song}, editor = {Chengqing Zong and Fei Xia and Wenjie Li and Roberto Navigli}, title = {PlotCoder: Hierarchical Decoding for Synthesizing Visualization Code in Programmatic Context}, booktitle = {Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, {ACL/IJCNLP} 2021, (Volume 1: Long Papers), Virtual Event, August 1-6, 2021}, pages = {2169--2181}, publisher = {Association for Computational Linguistics}, year = {2021}, url = {https://doi.org/10.18653/v1/2021.acl-long.169}, doi = {10.18653/V1/2021.ACL-LONG.169}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acl/ChenGCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/Chen0BDJLS21, author = {Xinyun Chen and Wenxiao Wang and Chris Bender and Yiming Ding and Ruoxi Jia and Bo Li and Dawn Song}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {{REFIT:} {A} Unified Watermark Removal Framework For Deep Learning Systems With Limited Data}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {321--335}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453079}, doi = {10.1145/3433210.3453079}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/Chen0BDJLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Song21, author = {Dawn Song}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Towards Building a Responsible Data Economy}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {3}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3482789}, doi = {10.1145/3460120.3482789}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Song21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangLWZSXZ21, author = {Jiaheng Zhang and Tianyi Liu and Weijie Wang and Yinuo Zhang and Dawn Song and Xiang Xie and Yupeng Zhang}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {159--177}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484767}, doi = {10.1145/3460120.3484767}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangLWZSXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/Jia0SXDK00S21, author = {Ruoxi Jia and Fan Wu and Xuehui Sun and Jiacen Xu and David Dao and Bhavya Kailkhura and Ce Zhang and Bo Li and Dawn Song}, title = {Scalability vs. Utility: Do We Have To Sacrifice One for the Other in Data Importance Quantification?}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {8239--8247}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Jia\_Scalability\_vs.\_Utility\_Do\_We\_Have\_To\_Sacrifice\_One\_for\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.00814}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/Jia0SXDK00S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/LiHS21, author = {Qinbin Li and Bingsheng He and Dawn Song}, title = {Model-Contrastive Federated Learning}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {10713--10722}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Li\_Model-Contrastive\_Federated\_Learning\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.01057}, timestamp = {Mon, 18 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/LiHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/HendrycksZBSS21, author = {Dan Hendrycks and Kevin Zhao and Steven Basart and Jacob Steinhardt and Dawn Song}, title = {Natural Adversarial Examples}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {15262--15271}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Hendrycks\_Natural\_Adversarial\_Examples\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.01501}, timestamp = {Mon, 18 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/HendrycksZBSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/WangLCH0S21, author = {Chenguang Wang and Xiao Liu and Zui Chen and Haoyun Hong and Jie Tang and Dawn Song}, editor = {Marie{-}Francine Moens and Xuanjing Huang and Lucia Specia and Scott Wen{-}tau Yih}, title = {Zero-Shot Information Extraction as a Unified Text-to-Triple Translation}, booktitle = {Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2021, Virtual Event / Punta Cana, Dominican Republic, 7-11 November, 2021}, pages = {1225--1238}, publisher = {Association for Computational Linguistics}, year = {2021}, url = {https://doi.org/10.18653/v1/2021.emnlp-main.94}, doi = {10.18653/V1/2021.EMNLP-MAIN.94}, timestamp = {Fri, 16 Feb 2024 08:27:36 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/WangLCH0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/Gai0Z0SS21, author = {Yu Gai and Paras Jain and Wendi Zhang and Joseph Gonzalez and Dawn Song and Ion Stoica}, editor = {Marie{-}Francine Moens and Xuanjing Huang and Lucia Specia and Scott Wen{-}tau Yih}, title = {Grounded Graph Decoding improves Compositional Generalization in Question Answering}, booktitle = {Findings of the Association for Computational Linguistics: {EMNLP} 2021, Virtual Event / Punta Cana, Dominican Republic, 16-20 November, 2021}, pages = {1829--1838}, publisher = {Association for Computational Linguistics}, year = {2021}, url = {https://doi.org/10.18653/v1/2021.findings-emnlp.157}, doi = {10.18653/V1/2021.FINDINGS-EMNLP.157}, timestamp = {Fri, 16 Feb 2024 08:27:36 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/Gai0Z0SS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/HendrycksBMKWDD21, author = {Dan Hendrycks and Steven Basart and Norman Mu and Saurav Kadavath and Frank Wang and Evan Dorundo and Rahul Desai and Tyler Zhu and Samyak Parajuli and Mike Guo and Dawn Song and Jacob Steinhardt and Justin Gilmer}, title = {The Many Faces of Robustness: {A} Critical Analysis of Out-of-Distribution Generalization}, booktitle = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2021, Montreal, QC, Canada, October 10-17, 2021}, pages = {8320--8329}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCV48922.2021.00823}, doi = {10.1109/ICCV48922.2021.00823}, timestamp = {Fri, 11 Mar 2022 10:01:27 +0100}, biburl = {https://dblp.org/rec/conf/iccv/HendrycksBMKWDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/GaoSLXQXMKS21, author = {Peng Gao and Fei Shao and Xiaoyuan Liu and Xusheng Xiao and Zheng Qin and Fengyuan Xu and Prateek Mittal and Sanjeev R. Kulkarni and Dawn Song}, title = {Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence}, booktitle = {37th {IEEE} International Conference on Data Engineering, {ICDE} 2021, Chania, Greece, April 19-22, 2021}, pages = {193--204}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICDE51399.2021.00024}, doi = {10.1109/ICDE51399.2021.00024}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icde/GaoSLXQXMKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/GaoSLXLQXMKS21, author = {Peng Gao and Fei Shao and Xiaoyuan Liu and Xusheng Xiao and Haoyuan Liu and Zheng Qin and Fengyuan Xu and Prateek Mittal and Sanjeev R. Kulkarni and Dawn Song}, title = {A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence}, booktitle = {37th {IEEE} International Conference on Data Engineering, {ICDE} 2021, Chania, Greece, April 19-22, 2021}, pages = {2705--2708}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICDE51399.2021.00309}, doi = {10.1109/ICDE51399.2021.00309}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icde/GaoSLXLQXMKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/HendrycksBBC0SS21, author = {Dan Hendrycks and Collin Burns and Steven Basart and Andrew Critch and Jerry Li and Dawn Song and Jacob Steinhardt}, title = {Aligning {AI} With Shared Human Values}, booktitle = {9th International Conference on Learning Representations, {ICLR} 2021, Virtual Event, Austria, May 3-7, 2021}, publisher = {OpenReview.net}, year = {2021}, url = {https://openreview.net/forum?id=dNy\_RKzJacY}, timestamp = {Wed, 23 Jun 2021 17:36:39 +0200}, biburl = {https://dblp.org/rec/conf/iclr/HendrycksBBC0SS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/HendrycksBBZMSS21, author = {Dan Hendrycks and Collin Burns and Steven Basart and Andy Zou and Mantas Mazeika and Dawn Song and Jacob Steinhardt}, title = {Measuring Massive Multitask Language Understanding}, booktitle = {9th International Conference on Learning Representations, {ICLR} 2021, Virtual Event, Austria, May 3-7, 2021}, publisher = {OpenReview.net}, year = {2021}, url = {https://openreview.net/forum?id=d7KBjmI3GmQ}, timestamp = {Wed, 23 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/HendrycksBBZMSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/LiZGZZSS21, author = {Zhuohan Li and Siyuan Zhuang and Shiyuan Guo and Danyang Zhuo and Hao Zhang and Dawn Song and Ion Stoica}, editor = {Marina Meila and Tong Zhang}, title = {TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale Language Models}, booktitle = {Proceedings of the 38th International Conference on Machine Learning, {ICML} 2021, 18-24 July 2021, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {139}, pages = {6543--6552}, publisher = {{PMLR}}, year = {2021}, url = {http://proceedings.mlr.press/v139/li21y.html}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/LiZGZZSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/LiHS21, author = {Qinbin Li and Bingsheng He and Dawn Song}, editor = {Zhi{-}Hua Zhou}, title = {Practical One-Shot Federated Learning for Cross-Silo Setting}, booktitle = {Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27 August 2021}, pages = {1484--1490}, publisher = {ijcai.org}, year = {2021}, url = {https://doi.org/10.24963/ijcai.2021/205}, doi = {10.24963/IJCAI.2021/205}, timestamp = {Wed, 25 Aug 2021 17:11:16 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/LiHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/WangJW0XS21, author = {Lun Wang and Zaynah Javed and Xian Wu and Wenbo Guo and Xinyu Xing and Dawn Song}, editor = {Zhi{-}Hua Zhou}, title = {{BACKDOORL:} Backdoor Attack against Competitive Reinforcement Learning}, booktitle = {Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27 August 2021}, pages = {3699--3705}, publisher = {ijcai.org}, year = {2021}, url = {https://doi.org/10.24963/ijcai.2021/509}, doi = {10.24963/IJCAI.2021/509}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/WangJW0XS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/LiuCLXYLSTYA21, author = {Aishan Liu and Xinyun Chen and Yingwei Li and Chaowei Xiao and Xun Yang and Xianglong Liu and Dawn Song and Dacheng Tao and Alan L. Yuille and Anima Anandkumar}, editor = {Heng Tao Shen and Yueting Zhuang and John R. Smith and Yang Yang and Pablo C{\'{e}}sar and Florian Metze and Balakrishnan Prabhakaran}, title = {ADVM'21: 1st International Workshop on Adversarial Learning for Multimedia}, booktitle = {{MM} '21: {ACM} Multimedia Conference, Virtual Event, China, October 20 - 24, 2021}, pages = {5686--5687}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474085.3478572}, doi = {10.1145/3474085.3478572}, timestamp = {Mon, 22 Apr 2024 21:24:20 +0200}, biburl = {https://dblp.org/rec/conf/mm/LiuCLXYLSTYA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HendrycksBKABTS21, author = {Dan Hendrycks and Collin Burns and Saurav Kadavath and Akul Arora and Steven Basart and Eric Tang and Dawn Song and Jacob Steinhardt}, editor = {Joaquin Vanschoren and Sai{-}Kit Yeung}, title = {Measuring Mathematical Problem Solving With the {MATH} Dataset}, booktitle = {Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021, December 2021, virtual}, year = {2021}, url = {https://datasets-benchmarks-proceedings.neurips.cc/paper/2021/hash/be83ab3ecd0db773eb2dc1b0a17836a1-Abstract-round2.html}, timestamp = {Thu, 05 May 2022 16:30:03 +0200}, biburl = {https://dblp.org/rec/conf/nips/HendrycksBKABTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HendrycksBKMAGB21, author = {Dan Hendrycks and Steven Basart and Saurav Kadavath and Mantas Mazeika and Akul Arora and Ethan Guo and Collin Burns and Samir Puranik and Horace He and Dawn Song and Jacob Steinhardt}, editor = {Joaquin Vanschoren and Sai{-}Kit Yeung}, title = {Measuring Coding Challenge Competence With {APPS}}, booktitle = {Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021, December 2021, virtual}, year = {2021}, url = {https://datasets-benchmarks-proceedings.neurips.cc/paper/2021/hash/c24cd76e1ce41366a4bbe8a49b02a028-Abstract-round2.html}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/HendrycksBKMAGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HendrycksMZPZNS21, author = {Dan Hendrycks and Mantas Mazeika and Andy Zou and Sahil Patel and Christine Zhu and Jesus Navarro and Dawn Song and Bo Li and Jacob Steinhardt}, editor = {Joaquin Vanschoren and Sai{-}Kit Yeung}, title = {What Would Jiminy Cricket Do? Towards Agents That Behave Morally}, booktitle = {Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021, December 2021, virtual}, year = {2021}, url = {https://datasets-benchmarks-proceedings.neurips.cc/paper/2021/hash/39059724f73a9969845dfe4146c5660e-Abstract-round2.html}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/HendrycksMZPZNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/MazeikaHLXHZRYWTTTSPBSPLF21, author = {Mantas Mazeika and Dan Hendrycks and Huichen Li and Xiaojun Xu and Sidney Q. Hough and Andy Zou and Arezoo Rajabi and Qi Yao and Zihao Wang and Jian Tian and Yao Tang and Di Tang and Roman Smirnov and Pavel Pleskov and Nikita Benkovich and Dawn Song and Radha Poovendran and Bo Li and David A. Forsyth}, editor = {Marco Ciccone and Gustavo Stolovitzky and Jacob Albrecht}, title = {The Trojan Detection Challenge}, booktitle = {NeurIPS 2022 Competition Track, November 28 - December 9, 2022, Online}, series = {Proceedings of Machine Learning Research}, volume = {220}, pages = {279--291}, publisher = {{PMLR}}, year = {2021}, url = {https://proceedings.mlr.press/v220/mazeika22a.html}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/MazeikaHLXHZRYWTTTSPBSPLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/SitawarinKSW21, author = {Chawin Sitawarin and Evgenios M. Kornaropoulos and Dawn Song and David A. Wagner}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {15486--15497}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/82ca5dd156cc926b2992f73c2896f761-Abstract.html}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/SitawarinKSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ChenST21, author = {Xinyun Chen and Dawn Song and Yuandong Tian}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Latent Execution for Neural Program Synthesis Beyond Domain-Specific Languages}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {22196--22208}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/ba3c95c2962d3aab2f6e667932daa3c5-Abstract.html}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/ChenST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/GaoLCSMFS21, author = {Peng Gao and Xiaoyuan Liu and Edward Choi and Bhavna Soman and Chinmaya Mishra and Kate Farris and Dawn Song}, editor = {Guoliang Li and Zhanhuai Li and Stratos Idreos and Divesh Srivastava}, title = {A System for Automated Open-Source Threat Intelligence Gathering and Management}, booktitle = {{SIGMOD} '21: International Conference on Management of Data, Virtual Event, China, June 20-25, 2021}, pages = {2716--2720}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448016.3452745}, doi = {10.1145/3448016.3452745}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/GaoLCSMFS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CarliniTWJHLRBS21, author = {Nicholas Carlini and Florian Tram{\`{e}}r and Eric Wallace and Matthew Jagielski and Ariel Herbert{-}Voss and Katherine Lee and Adam Roberts and Tom B. Brown and Dawn Song and {\'{U}}lfar Erlingsson and Alina Oprea and Colin Raffel}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Extracting Training Data from Large Language Models}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2633--2650}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/carlini-extracting}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/CarliniTWJHLRBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2021defi, editor = {Dawn Song and Roger Wattenhofer and Arthur Gervais and Philipp Jovanovic}, title = {DeFi '21: Proceedings of the 2021 {ACM} {CCS} Workshop on Decentralized Finance and Security, Virtual Event, Republic of Korea, 19 November 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3464967}, doi = {10.1145/3464967}, isbn = {978-1-4503-8540-4}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2021defi.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mm/2021advm, editor = {Dawn Song and Dacheng Tao and Alan L. Yuille and Anima Anandkumar and Aishan Liu and Xinyun Chen and Yingwei Li and Chaowei Xiao and Xun Yang and Xianglong Liu}, title = {{ADVM} '21: Proceedings of the 1st International Workshop on Adversarial Learning for Multimedia, Virtual Event, China, 20 October 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3475724}, doi = {10.1145/3475724}, isbn = {978-1-4503-8672-2}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/2021advm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-06761, author = {Peng Gao and Fei Shao and Xiaoyuan Liu and Xusheng Xiao and Haoyuan Liu and Zheng Qin and Fengyuan Xu and Prateek Mittal and Sanjeev R. Kulkarni and Dawn Song}, title = {A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence}, journal = {CoRR}, volume = {abs/2101.06761}, year = {2021}, url = {https://arxiv.org/abs/2101.06761}, eprinttype = {arXiv}, eprint = {2101.06761}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-06761.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-07769, author = {Peng Gao and Xiaoyuan Liu and Edward Choi and Bhavna Soman and Chinmaya Mishra and Kate Farris and Dawn Song}, title = {A System for Automated Open-Source Threat Intelligence Gathering and Management}, journal = {CoRR}, volume = {abs/2101.07769}, year = {2021}, url = {https://arxiv.org/abs/2101.07769}, eprinttype = {arXiv}, eprint = {2101.07769}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-07769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-07988, author = {Zhuohan Li and Siyuan Zhuang and Shiyuan Guo and Danyang Zhuo and Hao Zhang and Dawn Song and Ion Stoica}, title = {TeraPipe: Token-Level Pipeline Parallelism for Training Large-Scale Language Models}, journal = {CoRR}, volume = {abs/2102.07988}, year = {2021}, url = {https://arxiv.org/abs/2102.07988}, eprinttype = {arXiv}, eprint = {2102.07988}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-07988.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-01496, author = {Wenxiao Wang and Tianhao Wang and Lun Wang and Nanqing Luo and Pan Zhou and Dawn Song and Ruoxi Jia}, title = {DPlis: Boosting Utility of Differentially Private Deep Learning via Randomized Smoothing}, journal = {CoRR}, volume = {abs/2103.01496}, year = {2021}, url = {https://arxiv.org/abs/2103.01496}, eprinttype = {arXiv}, eprint = {2103.01496}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-01496.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-03874, author = {Dan Hendrycks and Collin Burns and Saurav Kadavath and Akul Arora and Steven Basart and Eric Tang and Dawn Song and Jacob Steinhardt}, title = {Measuring Mathematical Problem Solving With the {MATH} Dataset}, journal = {CoRR}, volume = {abs/2103.03874}, year = {2021}, url = {https://arxiv.org/abs/2103.03874}, eprinttype = {arXiv}, eprint = {2103.03874}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-03874.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-16257, author = {Qinbin Li and Bingsheng He and Dawn Song}, title = {Model-Contrastive Federated Learning}, journal = {CoRR}, volume = {abs/2103.16257}, year = {2021}, url = {https://arxiv.org/abs/2103.16257}, eprinttype = {arXiv}, eprint = {2103.16257}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-16257.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-00579, author = {Lun Wang and Zaynah Javed and Xian Wu and Wenbo Guo and Xinyu Xing and Dawn Song}, title = {{BACKDOORL:} Backdoor Attack against Competitive Reinforcement Learning}, journal = {CoRR}, volume = {abs/2105.00579}, year = {2021}, url = {https://arxiv.org/abs/2105.00579}, eprinttype = {arXiv}, eprint = {2105.00579}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-00579.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-09938, author = {Dan Hendrycks and Steven Basart and Saurav Kadavath and Mantas Mazeika and Akul Arora and Ethan Guo and Collin Burns and Samir Puranik and Horace He and Dawn Song and Jacob Steinhardt}, title = {Measuring Coding Challenge Competence With {APPS}}, journal = {CoRR}, volume = {abs/2105.09938}, year = {2021}, url = {https://arxiv.org/abs/2105.09938}, eprinttype = {arXiv}, eprint = {2105.09938}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-09938.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-12363, author = {Lun Wang and Dawn Song}, title = {Differentially Private Frequency Moments Estimation with Polylogarithmic Space}, journal = {CoRR}, volume = {abs/2105.12363}, year = {2021}, url = {https://arxiv.org/abs/2105.12363}, eprinttype = {arXiv}, eprint = {2105.12363}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-12363.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-14618, author = {Lun Wang and Qi Pang and Shuai Wang and Dawn Song}, title = {FED-{\(\chi\)}\({}_{\mbox{2}}\): Privacy Preserving Federated Correlation Test}, journal = {CoRR}, volume = {abs/2105.14618}, year = {2021}, url = {https://arxiv.org/abs/2105.14618}, eprinttype = {arXiv}, eprint = {2105.14618}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-14618.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-00101, author = {Xinyun Chen and Dawn Song and Yuandong Tian}, title = {Latent Execution for Neural Program Synthesis Beyond Domain-Specific Languages}, journal = {CoRR}, volume = {abs/2107.00101}, year = {2021}, url = {https://arxiv.org/abs/2107.00101}, eprinttype = {arXiv}, eprint = {2107.00101}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-00101.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-05211, author = {Shiyu Tang and Ruihao Gong and Yan Wang and Aishan Liu and Jiakai Wang and Xinyun Chen and Fengwei Yu and Xianglong Liu and Dawn Song and Alan L. Yuille and Philip H. S. Torr and Dacheng Tao}, title = {RobustART: Benchmarking Robustness on Architecture Design and Training Techniques}, journal = {CoRR}, volume = {abs/2109.05211}, year = {2021}, url = {https://arxiv.org/abs/2109.05211}, eprinttype = {arXiv}, eprint = {2109.05211}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-05211.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-11171, author = {Chenguang Wang and Xiao Liu and Zui Chen and Haoyun Hong and Jie Tang and Dawn Song}, title = {Zero-Shot Information Extraction as a Unified Text-to-Triple Translation}, journal = {CoRR}, volume = {abs/2109.11171}, year = {2021}, url = {https://arxiv.org/abs/2109.11171}, eprinttype = {arXiv}, eprint = {2109.11171}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-11171.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-13136, author = {Dan Hendrycks and Mantas Mazeika and Andy Zou and Sahil Patel and Christine Zhu and Jesus Navarro and Dawn Song and Bo Li and Jacob Steinhardt}, title = {What Would Jiminy Cricket Do? Towards Agents That Behave Morally}, journal = {CoRR}, volume = {abs/2110.13136}, year = {2021}, url = {https://arxiv.org/abs/2110.13136}, eprinttype = {arXiv}, eprint = {2110.13136}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-13136.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-03642, author = {Yu Gai and Paras Jain and Wendi Zhang and Joseph E. Gonzalez and Dawn Song and Ion Stoica}, title = {Grounded Graph Decoding Improves Compositional Generalization in Question Answering}, journal = {CoRR}, volume = {abs/2111.03642}, year = {2021}, url = {https://arxiv.org/abs/2111.03642}, eprinttype = {arXiv}, eprint = {2111.03642}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-03642.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-05135, author = {Dan Hendrycks and Andy Zou and Mantas Mazeika and Leonard Tang and Bo Li and Dawn Song and Jacob Steinhardt}, title = {PixMix: Dreamlike Pictures Comprehensively Improve Safety Measures}, journal = {CoRR}, volume = {abs/2112.05135}, year = {2021}, url = {https://arxiv.org/abs/2112.05135}, eprinttype = {arXiv}, eprint = {2112.05135}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-05135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-05588, author = {Jialuo Chen and Jingyi Wang and Tinglan Peng and Youcheng Sun and Peng Cheng and Shouling Ji and Xingjun Ma and Bo Li and Dawn Song}, title = {Copy, Right? {A} Testing Framework for Copyright Protection of Deep Learning Models}, journal = {CoRR}, volume = {abs/2112.05588}, year = {2021}, url = {https://arxiv.org/abs/2112.05588}, eprinttype = {arXiv}, eprint = {2112.05588}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-05588.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCorryBYS21, author = {Patrick McCorry and Chris Buckland and Bennet Yee and Dawn Song}, title = {SoK: Validating Bridges as a Scaling Solution for Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1589}, year = {2021}, url = {https://eprint.iacr.org/2021/1589}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/McCorryBYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BulusuKLVS20, author = {Saikiran Bulusu and Bhavya Kailkhura and Bo Li and Pramod K. Varshney and Dawn Song}, title = {Anomalous Example Detection in Deep Learning: {A} Survey}, journal = {{IEEE} Access}, volume = {8}, pages = {132330--132347}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3010274}, doi = {10.1109/ACCESS.2020.3010274}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/BulusuKLVS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/TrieuSSSS20, author = {Ni Trieu and Kareem Shehata and Prateek Saxena and Reza Shokri and Dawn Song}, title = {Epione: Lightweight Contact Tracing with Strong Privacy}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {95--107}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p95.pdf}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/TrieuSSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/LiuTKS20, author = {Xiaoyuan Liu and Ni Trieu and Evgenios M. Kornaropoulos and Dawn Song}, title = {BeeTrace: {A} Unified Platform for Secure Contact Tracing that Breaks Data Silos}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {108--120}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p108.pdf}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/LiuTKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ZhangHCKHJJMS20, author = {Fan Zhang and Warren He and Raymond Cheng and Jernej Kos and Nicholas Hynes and Noah M. Johnson and Ari Juels and Andrew Miller and Dawn Song}, title = {The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {3}, pages = {17--27}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2976984}, doi = {10.1109/MSEC.2020.2976984}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ZhangHCKHJJMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KohlbrennerSLAS20, author = {David Kohlbrenner and Shweta Shinde and Dayeol Lee and Krste Asanovic and Dawn Song}, title = {Building Open Trusted Execution Environments}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {5}, pages = {47--56}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2990649}, doi = {10.1109/MSEC.2020.2990649}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KohlbrennerSLAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/HendrycksLWDKS20, author = {Dan Hendrycks and Xiaoyuan Liu and Eric Wallace and Adam Dziedzic and Rishabh Krishnan and Dawn Song}, editor = {Dan Jurafsky and Joyce Chai and Natalie Schluter and Joel R. Tetreault}, title = {Pretrained Transformers Improve Out-of-Distribution Robustness}, booktitle = {Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, {ACL} 2020, Online, July 5-10, 2020}, pages = {2744--2751}, publisher = {Association for Computational Linguistics}, year = {2020}, url = {https://doi.org/10.18653/v1/2020.acl-main.244}, doi = {10.18653/V1/2020.ACL-MAIN.244}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/HendrycksLWDKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Song20, author = {Dawn Song}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{AI} and Security: Lessons, Challenges and Future Directions}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {1}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384771}, doi = {10.1145/3320269.3384771}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Song20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangFZS20, author = {Jiaheng Zhang and Zhiyong Fang and Yupeng Zhang and Dawn Song}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Zero Knowledge Proofs for Decision Tree Predictions and Accuracy}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2039--2053}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417278}, doi = {10.1145/3372297.3417278}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangFZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ZhangJP0LS20, author = {Yuheng Zhang and Ruoxi Jia and Hengzhi Pei and Wenxiao Wang and Bo Li and Dawn Song}, title = {The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks}, booktitle = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020}, pages = {250--258}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2020}, url = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Zhang\_The\_Secret\_Revealer\_Generative\_Model-Inversion\_Attacks\_Against\_Deep\_Neural\_Networks\_CVPR\_2020\_paper.html}, doi = {10.1109/CVPR42600.2020.00033}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/ZhangJP0LS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/WallaceSS20, author = {Eric Wallace and Mitchell Stern and Dawn Song}, editor = {Bonnie Webber and Trevor Cohn and Yulan He and Yang Liu}, title = {Imitation Attacks and Defenses for Black-box Machine Translation Systems}, booktitle = {Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2020, Online, November 16-20, 2020}, pages = {5531--5546}, publisher = {Association for Computational Linguistics}, year = {2020}, url = {https://doi.org/10.18653/v1/2020.emnlp-main.446}, doi = {10.18653/V1/2020.EMNLP-MAIN.446}, timestamp = {Wed, 23 Mar 2022 10:11:55 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/WallaceSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/JohnsonNHS20, author = {Noah M. Johnson and Joseph P. Near and Joseph M. Hellerstein and Dawn Song}, title = {Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {535--551}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00041}, doi = {10.1109/EUROSP48549.2020.00041}, timestamp = {Tue, 10 Nov 2020 11:45:04 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/JohnsonNHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/LeeKSAS20, author = {Dayeol Lee and David Kohlbrenner and Shweta Shinde and Krste Asanovic and Dawn Song}, editor = {Angelos Bilas and Kostas Magoutis and Evangelos P. Markatos and Dejan Kostic and Margo I. Seltzer}, title = {Keystone: an open framework for architecting trusted execution environments}, booktitle = {EuroSys '20: Fifteenth EuroSys Conference 2020, Heraklion, Greece, April 27-30, 2020}, pages = {38:1--38:16}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3342195.3387532}, doi = {10.1145/3342195.3387532}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/LeeKSAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/GuoWXXDS20, author = {Wenbo Guo and Lun Wang and Yan Xu and Xinyu Xing and Min Du and Dawn Song}, editor = {Claudia Plant and Haixun Wang and Alfredo Cuzzocrea and Carlo Zaniolo and Xindong Wu}, title = {Towards Inspecting and Eliminating Trojan Backdoors in Deep Neural Networks}, booktitle = {20th {IEEE} International Conference on Data Mining, {ICDM} 2020, Sorrento, Italy, November 17-20, 2020}, pages = {162--171}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDM50108.2020.00025}, doi = {10.1109/ICDM50108.2020.00025}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdm/GuoWXXDS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/ChenLYZSL20, author = {Xinyun Chen and Chen Liang and Adams Wei Yu and Denny Zhou and Dawn Song and Quoc V. Le}, title = {Neural Symbolic Reader: Scalable Integration of Distributed and Symbolic Representations for Reading Comprehension}, booktitle = {8th International Conference on Learning Representations, {ICLR} 2020, Addis Ababa, Ethiopia, April 26-30, 2020}, publisher = {OpenReview.net}, year = {2020}, url = {https://openreview.net/forum?id=ryxjnREFwH}, timestamp = {Thu, 07 May 2020 17:11:47 +0200}, biburl = {https://dblp.org/rec/conf/iclr/ChenLYZSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/DuJS20, author = {Min Du and Ruoxi Jia and Dawn Song}, title = {Robust anomaly detection and backdoor attack detection via differential privacy}, booktitle = {8th International Conference on Learning Representations, {ICLR} 2020, Addis Ababa, Ethiopia, April 26-30, 2020}, publisher = {OpenReview.net}, year = {2020}, url = {https://openreview.net/forum?id=SJx0q1rtvS}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/DuJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ChenLYSZ20, author = {Xinyun Chen and Chen Liang and Adams Wei Yu and Dawn Song and Denny Zhou}, editor = {Hugo Larochelle and Marc'Aurelio Ranzato and Raia Hadsell and Maria{-}Florina Balcan and Hsuan{-}Tien Lin}, title = {Compositional Generalization via Neural-Symbolic Stack Machines}, booktitle = {Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual}, year = {2020}, url = {https://proceedings.neurips.cc/paper/2020/hash/12b1e42dc0746f22cf361267de07073f-Abstract.html}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/ChenLYSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/GuptaCCS20, author = {Kavi Gupta and Peter Ebert Christensen and Xinyun Chen and Dawn Song}, editor = {Hugo Larochelle and Marc'Aurelio Ranzato and Raia Hadsell and Maria{-}Florina Balcan and Hsuan{-}Tien Lin}, title = {Synthesize, Execute and Debug: Learning to Repair for Neural Program Synthesis}, booktitle = {Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual}, year = {2020}, url = {https://proceedings.neurips.cc/paper/2020/hash/cd0f74b5955dc87fd0605745c4b49ee8-Abstract.html}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/GuptaCCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WangPS20, author = {Lun Wang and Qi Pang and Dawn Song}, editor = {Hugo Larochelle and Marc'Aurelio Ranzato and Raia Hadsell and Maria{-}Florina Balcan and Hsuan{-}Tien Lin}, title = {Towards practical differentially private causal graph discovery}, booktitle = {Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual}, year = {2020}, url = {https://proceedings.neurips.cc/paper/2020/hash/3b13b1eb44b05f57735764786fab9c2c-Abstract.html}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/WangPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/PengDL0S20, author = {Yanqing Peng and Min Du and Feifei Li and Raymond Cheng and Dawn Song}, editor = {David Maier and Rachel Pottinger and AnHai Doan and Wang{-}Chiew Tan and Abdussalam Alawini and Hung Q. Ngo}, title = {FalconDB: Blockchain-based Collaborative Database}, booktitle = {Proceedings of the 2020 International Conference on Management of Data, {SIGMOD} Conference 2020, online conference [Portland, OR, USA], June 14-19, 2020}, pages = {637--652}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3318464.3380594}, doi = {10.1145/3318464.3380594}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/PengDL0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangX0S20, author = {Jiaheng Zhang and Tiancheng Xie and Yupeng Zhang and Dawn Song}, title = {Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {859--876}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00052}, doi = {10.1109/SP40000.2020.00052}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhangX0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KosbaPPS20, author = {Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Dawn Song}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{MIRAGE:} Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2129--2146}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/kosba}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KosbaPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/0013RZJS20, author = {Tianhao Wang and Johannes Rausch and Ce Zhang and Ruoxi Jia and Dawn Song}, editor = {Qiang Yang and Lixin Fan and Han Yu}, title = {A Principled Approach to Data Valuation for Federated Learning}, booktitle = {Federated Learning - Privacy and Incentive}, series = {Lecture Notes in Computer Science}, volume = {12500}, pages = {153--167}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63076-8\_11}, doi = {10.1007/978-3-030-63076-8\_11}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/0013RZJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-05214, author = {Dell Zhang and Andr{\'{e}} Freitas and Dacheng Tao and Dawn Song}, title = {Proceedings of the {AAAI-20} Workshop on Intelligent Process Automation {(IPA-20)}}, journal = {CoRR}, volume = {abs/2001.05214}, year = {2020}, url = {https://arxiv.org/abs/2001.05214}, eprinttype = {arXiv}, eprint = {2001.05214}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-05214.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-06979, author = {Saikiran Bulusu and Bhavya Kailkhura and Bo Li and Pramod K. Varshney and Dawn Song}, title = {Anomalous Instance Detection in Deep Learning: {A} Survey}, journal = {CoRR}, volume = {abs/2003.06979}, year = {2020}, url = {https://arxiv.org/abs/2003.06979}, eprinttype = {arXiv}, eprint = {2003.06979}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-06979.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-06100, author = {Dan Hendrycks and Xiaoyuan Liu and Eric Wallace and Adam Dziedzic and Rishabh Krishnan and Dawn Song}, title = {Pretrained Transformers Improve Out-of-Distribution Robustness}, journal = {CoRR}, volume = {abs/2004.06100}, year = {2020}, url = {https://arxiv.org/abs/2004.06100}, eprinttype = {arXiv}, eprint = {2004.06100}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-06100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-13293, author = {Ni Trieu and Kareem Shehata and Prateek Saxena and Reza Shokri and Dawn Song}, title = {Epione: Lightweight Contact Tracing with Strong Privacy}, journal = {CoRR}, volume = {abs/2004.13293}, year = {2020}, url = {https://arxiv.org/abs/2004.13293}, eprinttype = {arXiv}, eprint = {2004.13293}, timestamp = {Sat, 02 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-13293.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-15015, author = {Eric Wallace and Mitchell Stern and Dawn Song}, title = {Imitation Attacks and Defenses for Black-box Machine Translation Systems}, journal = {CoRR}, volume = {abs/2004.15015}, year = {2020}, url = {https://arxiv.org/abs/2004.15015}, eprinttype = {arXiv}, eprint = {2004.15015}, timestamp = {Sun, 03 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-15015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-08598, author = {Lun Wang and Qi Pang and Dawn Song}, title = {Towards practical differentially private causal graph discovery}, journal = {CoRR}, volume = {abs/2006.08598}, year = {2020}, url = {https://arxiv.org/abs/2006.08598}, eprinttype = {arXiv}, eprint = {2006.08598}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-08598.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-16241, author = {Dan Hendrycks and Steven Basart and Norman Mu and Saurav Kadavath and Frank Wang and Evan Dorundo and Rahul Desai and Tyler Zhu and Samyak Parajuli and Mike Guo and Dawn Song and Jacob Steinhardt and Justin Gilmer}, title = {The Many Faces of Robustness: {A} Critical Analysis of Out-of-Distribution Generalization}, journal = {CoRR}, volume = {abs/2006.16241}, year = {2020}, url = {https://arxiv.org/abs/2006.16241}, eprinttype = {arXiv}, eprint = {2006.16241}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-16241.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-02285, author = {Xiaoyuan Liu and Ni Trieu and Evgenios M. Kornaropoulos and Dawn Song}, title = {BeeTrace: {A} Unified Platform for Secure Contact Tracing that Breaks Data Silos}, journal = {CoRR}, volume = {abs/2007.02285}, year = {2020}, url = {https://arxiv.org/abs/2007.02285}, eprinttype = {arXiv}, eprint = {2007.02285}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-02285.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-08095, author = {Kavi Gupta and Peter Ebert Christensen and Xinyun Chen and Dawn Song}, title = {Synthesize, Execute and Debug: Learning to Repair for Neural Program Synthesis}, journal = {CoRR}, volume = {abs/2007.08095}, year = {2020}, url = {https://arxiv.org/abs/2007.08095}, eprinttype = {arXiv}, eprint = {2007.08095}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-08095.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-02275, author = {Dan Hendrycks and Collin Burns and Steven Basart and Andrew Critch and Jerry Li and Dawn Song and Jacob Steinhardt}, title = {Aligning {AI} With Shared Human Values}, journal = {CoRR}, volume = {abs/2008.02275}, year = {2020}, url = {https://arxiv.org/abs/2008.02275}, eprinttype = {arXiv}, eprint = {2008.02275}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-02275.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-06662, author = {Xinyun Chen and Chen Liang and Adams Wei Yu and Dawn Song and Denny Zhou}, title = {Compositional Generalization via Neural-Symbolic Stack Machines}, journal = {CoRR}, volume = {abs/2008.06662}, year = {2020}, url = {https://arxiv.org/abs/2008.06662}, eprinttype = {arXiv}, eprint = {2008.06662}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-06662.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-03300, author = {Dan Hendrycks and Collin Burns and Steven Basart and Andy Zou and Mantas Mazeika and Dawn Song and Jacob Steinhardt}, title = {Measuring Massive Multitask Language Understanding}, journal = {CoRR}, volume = {abs/2009.03300}, year = {2020}, url = {https://arxiv.org/abs/2009.03300}, eprinttype = {arXiv}, eprint = {2009.03300}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-03300.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-06192, author = {Tianhao Wang and Johannes Rausch and Ce Zhang and Ruoxi Jia and Dawn Song}, title = {A Principled Approach to Data Valuation for Federated Learning}, journal = {CoRR}, volume = {abs/2009.06192}, year = {2020}, url = {https://arxiv.org/abs/2009.06192}, eprinttype = {arXiv}, eprint = {2009.06192}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-06192.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-01017, author = {Qinbin Li and Bingsheng He and Dawn Song}, title = {Model-Agnostic Round-Optimal Federated Learning via Knowledge Transfer}, journal = {CoRR}, volume = {abs/2010.01017}, year = {2020}, url = {https://arxiv.org/abs/2010.01017}, eprinttype = {arXiv}, eprint = {2010.01017}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-01017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-01175, author = {Lun Wang and Qi Pang and Shuai Wang and Dawn Song}, title = {F2ED-Learning: Good Fences Make Good Neighbors}, journal = {CoRR}, volume = {abs/2010.01175}, year = {2020}, url = {https://arxiv.org/abs/2010.01175}, eprinttype = {arXiv}, eprint = {2010.01175}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-01175.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-11967, author = {Chenguang Wang and Xiao Liu and Dawn Song}, title = {Language Models are Open Knowledge Graphs}, journal = {CoRR}, volume = {abs/2010.11967}, year = {2020}, url = {https://arxiv.org/abs/2010.11967}, eprinttype = {arXiv}, eprint = {2010.11967}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-11967.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-13637, author = {Peng Gao and Fei Shao and Xiaoyuan Liu and Xusheng Xiao and Zheng Qin and Fengyuan Xu and Prateek Mittal and Sanjeev R. Kulkarni and Dawn Song}, title = {Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence}, journal = {CoRR}, volume = {abs/2010.13637}, year = {2020}, url = {https://arxiv.org/abs/2010.13637}, eprinttype = {arXiv}, eprint = {2010.13637}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-13637.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-09719, author = {Chawin Sitawarin and Evgenios M. Kornaropoulos and Dawn Song and David A. Wagner}, title = {Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams}, journal = {CoRR}, volume = {abs/2011.09719}, year = {2020}, url = {https://arxiv.org/abs/2011.09719}, eprinttype = {arXiv}, eprint = {2011.09719}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-09719.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-01654, author = {Aishan Liu and Shiyu Tang and Xianglong Liu and Xinyun Chen and Lei Huang and Zhuozhuo Tu and Dawn Song and Dacheng Tao}, title = {Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization}, journal = {CoRR}, volume = {abs/2012.01654}, year = {2020}, url = {https://arxiv.org/abs/2012.01654}, eprinttype = {arXiv}, eprint = {2012.01654}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-01654.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-05291, author = {Usmann Khan and Lun Wang and Jithendaraa Subramanian and Joseph P. Near and Dawn Song}, title = {PrivFramework: {A} System for Configurable and Automated Privacy Policy Compliance}, journal = {CoRR}, volume = {abs/2012.05291}, year = {2020}, url = {https://arxiv.org/abs/2012.05291}, eprinttype = {arXiv}, eprint = {2012.05291}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-05291.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-07805, author = {Nicholas Carlini and Florian Tram{\`{e}}r and Eric Wallace and Matthew Jagielski and Ariel Herbert{-}Voss and Katherine Lee and Adam Roberts and Tom B. Brown and Dawn Song and {\'{U}}lfar Erlingsson and Alina Oprea and Colin Raffel}, title = {Extracting Training Data from Large Language Models}, journal = {CoRR}, volume = {abs/2012.07805}, year = {2020}, url = {https://arxiv.org/abs/2012.07805}, eprinttype = {arXiv}, eprint = {2012.07805}, timestamp = {Sat, 02 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-07805.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-10544, author = {Micah Goldblum and Dimitris Tsipras and Chulin Xie and Xinyun Chen and Avi Schwarzschild and Dawn Song and Aleksander Madry and Bo Li and Tom Goldstein}, title = {Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses}, journal = {CoRR}, volume = {abs/2012.10544}, year = {2020}, url = {https://arxiv.org/abs/2012.10544}, eprinttype = {arXiv}, eprint = {2012.10544}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-10544.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KosbaPPS20, author = {Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Dawn Song}, title = {{MIRAGE:} Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2020}, url = {https://eprint.iacr.org/2020/278}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KosbaPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/NearDASGWSZSSS19, author = {Joseph P. Near and David Darais and Chike Abuah and Tim Stevens and Pranav Gaddamadugu and Lun Wang and Neel Somani and Mu Zhang and Nikhil Sharma and Alex Shan and Dawn Song}, title = {Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy}, journal = {Proc. {ACM} Program. Lang.}, volume = {3}, number = {{OOPSLA}}, pages = {172:1--172:30}, year = {2019}, url = {https://doi.org/10.1145/3360598}, doi = {10.1145/3360598}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/NearDASGWSZSSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/JiaDWHGLZSS19, author = {Ruoxi Jia and David Dao and Boxin Wang and Frances Ann Hubis and Nezihe Merve G{\"{u}}rel and Bo Li and Ce Zhang and Costas J. Spanos and Dawn Song}, title = {Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms}, journal = {Proc. {VLDB} Endow.}, volume = {12}, number = {11}, pages = {1610--1623}, year = {2019}, url = {http://www.vldb.org/pvldb/vol12/p1610-jia.pdf}, doi = {10.14778/3342263.3342637}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pvldb/JiaDWHGLZSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/KwonLKSK19, author = {Yujin Kwon and Jian Liu and Minjeong Kim and Dawn Song and Yongdae Kim}, title = {Impossibility of Full Decentralization in Permissionless Blockchains}, booktitle = {Proceedings of the 1st {ACM} Conference on Advances in Financial Technologies, {AFT} 2019, Zurich, Switzerland, October 21-23, 2019}, pages = {110--123}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3318041.3355463}, doi = {10.1145/3318041.3355463}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aft/KwonLKSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aistats/JiaDWHHGLZSS19, author = {Ruoxi Jia and David Dao and Boxin Wang and Frances Ann Hubis and Nick Hynes and Nezihe Merve G{\"{u}}rel and Bo Li and Ce Zhang and Dawn Song and Costas J. Spanos}, editor = {Kamalika Chaudhuri and Masashi Sugiyama}, title = {Towards Efficient Data Valuation Based on the Shapley Value}, booktitle = {The 22nd International Conference on Artificial Intelligence and Statistics, {AISTATS} 2019, 16-18 April 2019, Naha, Okinawa, Japan}, series = {Proceedings of Machine Learning Research}, volume = {89}, pages = {1167--1176}, publisher = {{PMLR}}, year = {2019}, url = {http://proceedings.mlr.press/v89/jia19a.html}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aistats/JiaDWHHGLZSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/PanWZLYS19, author = {Xinlei Pan and Weiyao Wang and Xiaoshuai Zhang and Bo Li and Jinfeng Yi and Dawn Song}, editor = {Edith Elkind and Manuela Veloso and Noa Agmon and Matthew E. Taylor}, title = {How You Act Tells a Lot: Privacy-Leaking Attack on Deep Reinforcement Learning}, booktitle = {Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, {AAMAS} '19, Montreal, QC, Canada, May 13-17, 2019}, pages = {368--376}, publisher = {International Foundation for Autonomous Agents and Multiagent Systems}, year = {2019}, url = {http://dl.acm.org/citation.cfm?id=3331715}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/PanWZLYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuCLOS19, author = {Min Du and Zhi Chen and Chang Liu and Rajvardhan Oak and Dawn Song}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Lifelong Anomaly Detection Through Unlearning}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1283--1297}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363226}, doi = {10.1145/3319535.3363226}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DuCLOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuanMGYLSWL19, author = {Dong Yuan and Yuanli Miao and Neil Zhenqiang Gong and Zheng Yang and Qi Li and Dawn Song and Qian Wang and Xiao Liang}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Detecting Fake Accounts in Online Social Networks at the Time of Registrations}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1423--1438}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363198}, doi = {10.1145/3319535.3363198}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YuanMGYLSWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaramZWLZJS19, author = {Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {{CHURP:} Dynamic-Committee Proactive Secret Sharing}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2369--2386}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363203}, doi = {10.1145/3319535.3363203}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaramZWLZJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/XieZZPS19, author = {Tiancheng Xie and Jiaheng Zhang and Yupeng Zhang and Charalampos Papamanthou and Dawn Song}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {733--764}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_24}, doi = {10.1007/978-3-030-26954-8\_24}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/XieZZPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/LebedevHDKLASD19, author = {Ilia A. Lebedev and Kyle Hogan and Jules Drean and David Kohlbrenner and Dayeol Lee and Krste Asanovic and Dawn Song and Srinivas Devadas}, editor = {J{\"{u}}rgen Teich and Franco Fummi}, title = {Sanctorum: {A} lightweight security monitor for secure enclaves}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2019, Florence, Italy, March 25-29, 2019}, pages = {1142--1147}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/DATE.2019.8715182}, doi = {10.23919/DATE.2019.8715182}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/LebedevHDKLASD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ChengZKHHJJ0S19, author = {Raymond Cheng and Fan Zhang and Jernej Kos and Warren He and Nicholas Hynes and Noah M. Johnson and Ari Juels and Andrew Miller and Dawn Song}, title = {Ekiden: {A} Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {185--200}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00023}, doi = {10.1109/EUROSP.2019.00023}, timestamp = {Tue, 09 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ChengZKHHJJ0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/XiaoDLLEYSLM19, author = {Chaowei Xiao and Ruizhi Deng and Bo Li and Taesung Lee and Benjamin Edwards and Jinfeng Yi and Dawn Song and Mingyan Liu and Ian M. Molloy}, title = {AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos}, booktitle = {2019 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2019, Seoul, Korea (South), October 27 - November 2, 2019}, pages = {3967--3976}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCV.2019.00407}, doi = {10.1109/ICCV.2019.00407}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccv/XiaoDLLEYSLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/ChenLS19, author = {Xinyun Chen and Chang Liu and Dawn Song}, title = {Execution-Guided Neural Program Synthesis}, booktitle = {7th International Conference on Learning Representations, {ICLR} 2019, New Orleans, LA, USA, May 6-9, 2019}, publisher = {OpenReview.net}, year = {2019}, url = {https://openreview.net/forum?id=H1gfOiAqYm}, timestamp = {Thu, 25 Jul 2019 13:03:15 +0200}, biburl = {https://dblp.org/rec/conf/iclr/ChenLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/HuangDSS19, author = {Daniel Huang and Prafulla Dhariwal and Dawn Song and Ilya Sutskever}, title = {GamePad: {A} Learning Environment for Theorem Proving}, booktitle = {7th International Conference on Learning Representations, {ICLR} 2019, New Orleans, LA, USA, May 6-9, 2019}, publisher = {OpenReview.net}, year = {2019}, url = {https://openreview.net/forum?id=r1xwKoR9Y7}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/HuangDSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/ShinKGBTSS19, author = {Richard Shin and Neel Kant and Kavi Gupta and Chris Bender and Brandon Trabucco and Rishabh Singh and Dawn Song}, title = {Synthetic Datasets for Neural Program Synthesis}, booktitle = {7th International Conference on Learning Representations, {ICLR} 2019, New Orleans, LA, USA, May 6-9, 2019}, publisher = {OpenReview.net}, year = {2019}, url = {https://openreview.net/forum?id=ryeOSnAqYm}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/ShinKGBTSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/YangLCS19, author = {Zhuolin Yang and Bo Li and Pin{-}Yu Chen and Dawn Song}, title = {Characterizing Audio Adversarial Examples Using Temporal Dependency}, booktitle = {7th International Conference on Learning Representations, {ICLR} 2019, New Orleans, LA, USA, May 6-9, 2019}, publisher = {OpenReview.net}, year = {2019}, url = {https://openreview.net/forum?id=r1g4E3C9t7}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/YangLCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/XiaLGLCS19, author = {Zenghua Xia and Chang Liu and Neil Zhenqiang Gong and Qi Li and Yong Cui and Dawn Song}, editor = {Ankur Teredesai and Vipin Kumar and Ying Li and R{\'{o}}mer Rosales and Evimaria Terzi and George Karypis}, title = {Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: {A} Case Study}, booktitle = {Proceedings of the 25th {ACM} {SIGKDD} International Conference on Knowledge Discovery {\&} Data Mining, {KDD} 2019, Anchorage, AK, USA, August 4-8, 2019}, pages = {2012--2022}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292500.3330702}, doi = {10.1145/3292500.3330702}, timestamp = {Sun, 27 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kdd/XiaLGLCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HendrycksMKS19, author = {Dan Hendrycks and Mantas Mazeika and Saurav Kadavath and Dawn Song}, editor = {Hanna M. Wallach and Hugo Larochelle and Alina Beygelzimer and Florence d'Alch{\'{e}}{-}Buc and Emily B. Fox and Roman Garnett}, title = {Using Self-Supervised Learning Can Improve Model Robustness and Uncertainty}, booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada}, pages = {15637--15648}, year = {2019}, url = {https://proceedings.neurips.cc/paper/2019/hash/a2b15837edac15df90721968986f7f8e-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/HendrycksMKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/WuJYBSPX19, author = {Zhengkai Wu and Evan Johnson and Wei Yang and Osbert Bastani and Dawn Song and Jian Peng and Tao Xie}, editor = {Marlon Dumas and Dietmar Pfahl and Sven Apel and Alessandra Russo}, title = {{REINAM:} reinforcement learning for input-grammar inference}, booktitle = {Proceedings of the {ACM} Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/SIGSOFT} {FSE} 2019, Tallinn, Estonia, August 26-30, 2019}, pages = {488--498}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338906.3338958}, doi = {10.1145/3338906.3338958}, timestamp = {Sat, 30 Sep 2023 09:56:36 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/WuJYBSPX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/IyengarNSTTW19, author = {Roger Iyengar and Joseph P. Near and Dawn Song and Om Thakkar and Abhradeep Thakurta and Lun Wang}, title = {Towards Practical Differentially Private Convex Optimization}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {299--316}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00001}, doi = {10.1109/SP.2019.00001}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/IyengarNSTTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Carlini0EKS19, author = {Nicholas Carlini and Chang Liu and {\'{U}}lfar Erlingsson and Jernej Kos and Dawn Song}, editor = {Nadia Heninger and Patrick Traynor}, title = {The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {267--284}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/carlini}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/Carlini0EKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GuoMXDS19, author = {Wenbo Guo and Dongliang Mu and Xinyu Xing and Min Du and Dawn Song}, editor = {Nadia Heninger and Patrick Traynor}, title = {{DEEPVSA:} Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1787--1804}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/guo}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GuoMXDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/WangNSGLDS19, author = {Lun Wang and Joseph P. Near and Neel Somani and Peng Gao and Andrew Low and David Dao and Dawn Song}, editor = {Vijay Gadepally and Timothy G. Mattson and Michael Stonebraker and Fusheng Wang and Gang Luo and Yanhui Laing and Alevtina Dubovitskaya}, title = {Data Capsule: {A} New Paradigm for Automatic Compliance with Data Privacy Regulations}, booktitle = {Heterogeneous Data Management, Polystores, and Analytics for Healthcare - {VLDB} 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August 30, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11721}, pages = {3--23}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-33752-0\_1}, doi = {10.1007/978-3-030-33752-0\_1}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vldb/WangNSGLDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-10275, author = {Ruoxi Jia and David Dao and Boxin Wang and Frances Ann Hubis and Nick Hynes and Nezihe Merve G{\"{u}}rel and Bo Li and Ce Zhang and Dawn Song and Costas J. Spanos}, title = {Towards Efficient Data Valuation Based on the Shapley Value}, journal = {CoRR}, volume = {abs/1902.10275}, year = {2019}, url = {http://arxiv.org/abs/1902.10275}, eprinttype = {arXiv}, eprint = {1902.10275}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-10275.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-03257, author = {Alexander Ratner and Dan Alistarh and Gustavo Alonso and David G. Andersen and Peter Bailis and Sarah Bird and Nicholas Carlini and Bryan Catanzaro and Eric S. Chung and Bill Dally and Jeff Dean and Inderjit S. Dhillon and Alexandros G. Dimakis and Pradeep Dubey and Charles Elkan and Grigori Fursin and Gregory R. Ganger and Lise Getoor and Phillip B. Gibbons and Garth A. Gibson and Joseph E. Gonzalez and Justin Gottschlich and Song Han and Kim M. Hazelwood and Furong Huang and Martin Jaggi and Kevin G. Jamieson and Michael I. Jordan and Gauri Joshi and Rania Khalaf and Jason Knight and Jakub Kone{\v{c}}n{\'y} and Tim Kraska and Arun Kumar and Anastasios Kyrillidis and Jing Li and Samuel Madden and H. Brendan McMahan and Erik Meijer and Ioannis Mitliagkas and Rajat Monga and Derek Gordon Murray and Dimitris S. Papailiopoulos and Gennady Pekhimenko and Theodoros Rekatsinas and Afshin Rostamizadeh and Christopher R{\'{e}} and Christopher De Sa and Hanie Sedghi and Siddhartha Sen and Virginia Smith and Alex Smola and Dawn Song and Evan R. Sparks and Ion Stoica and Vivienne Sze and Madeleine Udell and Joaquin Vanschoren and Shivaram Venkataraman and Rashmi Vinayak and Markus Weimer and Andrew Gordon Wilson and Eric P. Xing and Matei Zaharia and Ce Zhang and Ameet Talwalkar}, title = {SysML: The New Frontier of Machine Learning Systems}, journal = {CoRR}, volume = {abs/1904.03257}, year = {2019}, url = {http://arxiv.org/abs/1904.03257}, eprinttype = {arXiv}, eprint = {1904.03257}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-03257.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-11082, author = {Xinlei Pan and Weiyao Wang and Xiaoshuai Zhang and Bo Li and Jinfeng Yi and Dawn Song}, title = {How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning}, journal = {CoRR}, volume = {abs/1904.11082}, year = {2019}, url = {http://arxiv.org/abs/1904.11082}, eprinttype = {arXiv}, eprint = {1904.11082}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-11082.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-05158, author = {Yujin Kwon and Jian Liu and Minjeong Kim and Dawn Song and Yongdae Kim}, title = {Impossibility of Full Decentralization in Permissionless Blockchains}, journal = {CoRR}, volume = {abs/1905.05158}, year = {2019}, url = {http://arxiv.org/abs/1905.05158}, eprinttype = {arXiv}, eprint = {1905.05158}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-05158.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-12340, author = {Dan Hendrycks and Mantas Mazeika and Saurav Kadavath and Dawn Song}, title = {Using Self-Supervised Learning Can Improve Model Robustness and Uncertainty}, journal = {CoRR}, volume = {abs/1906.12340}, year = {2019}, url = {http://arxiv.org/abs/1906.12340}, eprinttype = {arXiv}, eprint = {1906.12340}, timestamp = {Mon, 01 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-12340.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-07174, author = {Dan Hendrycks and Kevin Zhao and Steven Basart and Jacob Steinhardt and Dawn Song}, title = {Natural Adversarial Examples}, journal = {CoRR}, volume = {abs/1907.07174}, year = {2019}, url = {http://arxiv.org/abs/1907.07174}, eprinttype = {arXiv}, eprint = {1907.07174}, timestamp = {Tue, 23 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-07174.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-09470, author = {Chaowei Xiao and Xinlei Pan and Warren He and Jian Peng and Mingjie Sun and Jinfeng Yi and Mingyan Liu and Bo Li and Dawn Song}, title = {Characterizing Attacks on Deep Reinforcement Learning}, journal = {CoRR}, volume = {abs/1907.09470}, year = {2019}, url = {http://arxiv.org/abs/1907.09470}, eprinttype = {arXiv}, eprint = {1907.09470}, timestamp = {Sat, 18 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-09470.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-10119, author = {Dayeol Lee and David Kohlbrenner and Shweta Shinde and Dawn Song and Krste Asanovic}, title = {Keystone: {A} Framework for Architecting TEEs}, journal = {CoRR}, volume = {abs/1907.10119}, year = {2019}, url = {http://arxiv.org/abs/1907.10119}, eprinttype = {arXiv}, eprint = {1907.10119}, timestamp = {Thu, 01 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-10119.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-01763, author = {Wenbo Guo and Lun Wang and Xinyu Xing and Min Du and Dawn Song}, title = {{TABOR:} {A} Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in {AI} Systems}, journal = {CoRR}, volume = {abs/1908.01763}, year = {2019}, url = {http://arxiv.org/abs/1908.01763}, eprinttype = {arXiv}, eprint = {1908.01763}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-01763.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-08619, author = {Ruoxi Jia and David Dao and Boxin Wang and Frances Ann Hubis and Nezihe Merve G{\"{u}}rel and Bo Li and Ce Zhang and Costas J. Spanos and Dawn Song}, title = {Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms}, journal = {CoRR}, volume = {abs/1908.08619}, year = {2019}, url = {http://arxiv.org/abs/1908.08619}, eprinttype = {arXiv}, eprint = {1908.08619}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-08619.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-00077, author = {Lun Wang and Joseph P. Near and Neel Somani and Peng Gao and Andrew Low and David Dao and Dawn Song}, title = {Data Capsule: {A} New Paradigm for Automatic Compliance with Data Privacy Regulations}, journal = {CoRR}, volume = {abs/1909.00077}, year = {2019}, url = {http://arxiv.org/abs/1909.00077}, eprinttype = {arXiv}, eprint = {1909.00077}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-00077.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-02481, author = {Joseph P. Near and David Darais and Chike Abuah and Tim Stevens and Pranav Gaddamadugu and Lun Wang and Neel Somani and Mu Zhang and Nikhil Sharma and Alex Shan and Dawn Song}, title = {Duet: An Expressive Higher-order Language and Linear Type System for Statically Enforcing Differential Privacy}, journal = {CoRR}, volume = {abs/1909.02481}, year = {2019}, url = {http://arxiv.org/abs/1909.02481}, eprinttype = {arXiv}, eprint = {1909.02481}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-02481.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-07116, author = {Min Du and Ruoxi Jia and Dawn Song}, title = {Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy}, journal = {CoRR}, volume = {abs/1911.07116}, year = {2019}, url = {http://arxiv.org/abs/1911.07116}, eprinttype = {arXiv}, eprint = {1911.07116}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-07116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-07128, author = {Ruoxi Jia and Xuehui Sun and Jiacen Xu and Ce Zhang and Bo Li and Dawn Song}, title = {An Empirical and Comparative Analysis of Data Valuation with Scalable Algorithms}, journal = {CoRR}, volume = {abs/1911.07128}, year = {2019}, url = {http://arxiv.org/abs/1911.07128}, eprinttype = {arXiv}, eprint = {1911.07128}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-07128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-07135, author = {Yuheng Zhang and Ruoxi Jia and Hengzhi Pei and Wenxiao Wang and Bo Li and Dawn Song}, title = {The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks}, journal = {CoRR}, volume = {abs/1911.07135}, year = {2019}, url = {http://arxiv.org/abs/1911.07135}, eprinttype = {arXiv}, eprint = {1911.07135}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-07135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-07205, author = {Xinyun Chen and Wenxiao Wang and Chris Bender and Yiming Ding and Ruoxi Jia and Bo Li and Dawn Song}, title = {{REFIT:} a Unified Watermark Removal Framework for Deep Learning Systems with Limited Data}, journal = {CoRR}, volume = {abs/1911.07205}, year = {2019}, url = {http://arxiv.org/abs/1911.07205}, eprinttype = {arXiv}, eprint = {1911.07205}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-07205.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-11132, author = {Dan Hendrycks and Steven Basart and Mantas Mazeika and Mohammadreza Mostajabi and Jacob Steinhardt and Dawn Song}, title = {A Benchmark for Anomaly Segmentation}, journal = {CoRR}, volume = {abs/1911.11132}, year = {2019}, url = {http://arxiv.org/abs/1911.11132}, eprinttype = {arXiv}, eprint = {1911.11132}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-11132.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-04977, author = {Peter Kairouz and H. Brendan McMahan and Brendan Avent and Aur{\'{e}}lien Bellet and Mehdi Bennis and Arjun Nitin Bhagoji and Kallista A. Bonawitz and Zachary Charles and Graham Cormode and Rachel Cummings and Rafael G. L. D'Oliveira and Salim El Rouayheb and David Evans and Josh Gardner and Zachary Garrett and Adri{\`{a}} Gasc{\'{o}}n and Badih Ghazi and Phillip B. Gibbons and Marco Gruteser and Za{\"{\i}}d Harchaoui and Chaoyang He and Lie He and Zhouyuan Huo and Ben Hutchinson and Justin Hsu and Martin Jaggi and Tara Javidi and Gauri Joshi and Mikhail Khodak and Jakub Kone{\v{c}}n{\'y} and Aleksandra Korolova and Farinaz Koushanfar and Sanmi Koyejo and Tancr{\`{e}}de Lepoint and Yang Liu and Prateek Mittal and Mehryar Mohri and Richard Nock and Ayfer {\"{O}}zg{\"{u}}r and Rasmus Pagh and Mariana Raykova and Hang Qi and Daniel Ramage and Ramesh Raskar and Dawn Song and Weikang Song and Sebastian U. Stich and Ziteng Sun and Ananda Theertha Suresh and Florian Tram{\`{e}}r and Praneeth Vepakomma and Jianyu Wang and Li Xiong and Zheng Xu and Qiang Yang and Felix X. Yu and Han Yu and Sen Zhao}, title = {Advances and Open Problems in Federated Learning}, journal = {CoRR}, volume = {abs/1912.04977}, year = {2019}, url = {http://arxiv.org/abs/1912.04977}, eprinttype = {arXiv}, eprint = {1912.04977}, timestamp = {Mon, 11 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-04977.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-12345, author = {Richard Shin and Neel Kant and Kavi Gupta and Christopher Bender and Brandon Trabucco and Rishabh Singh and Dawn Song}, title = {Synthetic Datasets for Neural Program Synthesis}, journal = {CoRR}, volume = {abs/1912.12345}, year = {2019}, url = {http://arxiv.org/abs/1912.12345}, eprinttype = {arXiv}, eprint = {1912.12345}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-12345.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-12612, author = {Roy Fox and Richard Shin and William Paul and Yitian Zou and Dawn Song and Ken Goldberg and Pieter Abbeel and Ion Stoica}, title = {Hierarchical Variational Imitation Learning of Control Programs}, journal = {CoRR}, volume = {abs/1912.12612}, year = {2019}, url = {http://arxiv.org/abs/1912.12612}, eprinttype = {arXiv}, eprint = {1912.12612}, timestamp = {Sat, 04 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-12612.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LebedevHDKLASD19, author = {Ilia A. Lebedev and Kyle Hogan and Jules Drean and David Kohlbrenner and Dayeol Lee and Krste Asanovic and Dawn Song and Srinivas Devadas}, title = {Sanctorum: {A} lightweight security monitor for secure enclaves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2019}, url = {https://eprint.iacr.org/2019/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LebedevHDKLASD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Maram0WLZJS19, author = {Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song}, title = {{CHURP:} Dynamic-Committee Proactive Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2019}, url = {https://eprint.iacr.org/2019/017}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Maram0WLZJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XieZZPS19, author = {Tiancheng Xie and Jiaheng Zhang and Yupeng Zhang and Charalampos Papamanthou and Dawn Song}, title = {Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2019}, url = {https://eprint.iacr.org/2019/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XieZZPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangX0S19, author = {Jiaheng Zhang and Tiancheng Xie and Yupeng Zhang and Dawn Song}, title = {Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1482}, year = {2019}, url = {https://eprint.iacr.org/2019/1482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangX0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/JohnsonNS18, author = {Noah M. Johnson and Joseph P. Near and Dawn Song}, title = {Towards Practical Differential Privacy for {SQL} Queries}, journal = {Proc. {VLDB} Endow.}, volume = {11}, number = {5}, pages = {526--539}, year = {2018}, url = {http://www.vldb.org/pvldb/vol11/p526-johnson.pdf}, doi = {10.1145/3187009.3177733}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/JohnsonNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/HynesDYCS18, author = {Nick Hynes and David Dao and David Yan and Raymond Cheng and Dawn Song}, title = {A Demonstration of Sterling: {A} Privacy-Preserving Data Marketplace}, journal = {Proc. {VLDB} Endow.}, volume = {11}, number = {12}, pages = {2086--2089}, year = {2018}, url = {http://www.vldb.org/pvldb/vol11/p2086-hynes.pdf}, doi = {10.14778/3229863.3236266}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/HynesDYCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SongYLS18, author = {Wei Song and Heng Yin and Chang Liu and Dawn Song}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {606--618}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243813}, doi = {10.1145/3243734.3243813}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SongYLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/EykholtEF0RXPKS18, author = {Kevin Eykholt and Ivan Evtimov and Earlence Fernandes and Bo Li and Amir Rahmati and Chaowei Xiao and Atul Prakash and Tadayoshi Kohno and Dawn Song}, title = {Robust Physical-World Attacks on Deep Learning Visual Classification}, booktitle = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2018, Salt Lake City, UT, USA, June 18-22, 2018}, pages = {1625--1634}, publisher = {Computer Vision Foundation / {IEEE} Computer Society}, year = {2018}, url = {http://openaccess.thecvf.com/content\_cvpr\_2018/html/Eykholt\_Robust\_Physical-World\_Attacks\_CVPR\_2018\_paper.html}, doi = {10.1109/CVPR.2018.00175}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/EykholtEF0RXPKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/XuCLRDS18, author = {Xiaojun Xu and Xinyun Chen and Chang Liu and Anna Rohrbach and Trevor Darrell and Dawn Song}, title = {Fooling Vision and Language Models Despite Localization and Attention Mechanism}, booktitle = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2018, Salt Lake City, UT, USA, June 18-22, 2018}, pages = {4951--4961}, publisher = {Computer Vision Foundation / {IEEE} Computer Society}, year = {2018}, url = {http://openaccess.thecvf.com/content\_cvpr\_2018/html/Xu\_Fooling\_Vision\_and\_CVPR\_2018\_paper.html}, doi = {10.1109/CVPR.2018.00520}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/XuCLRDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/BhagojiHLS18, author = {Arjun Nitin Bhagoji and Warren He and Bo Li and Dawn Song}, editor = {Vittorio Ferrari and Martial Hebert and Cristian Sminchisescu and Yair Weiss}, title = {Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms}, booktitle = {Computer Vision - {ECCV} 2018 - 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part {XII}}, series = {Lecture Notes in Computer Science}, volume = {11216}, pages = {158--174}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01258-8\_10}, doi = {10.1007/978-3-030-01258-8\_10}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eccv/BhagojiHLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/XiaoDLYLS18, author = {Chaowei Xiao and Ruizhi Deng and Bo Li and Fisher Yu and Mingyan Liu and Dawn Song}, editor = {Vittorio Ferrari and Martial Hebert and Cristian Sminchisescu and Yair Weiss}, title = {Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation}, booktitle = {Computer Vision - {ECCV} 2018 - 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part {X}}, series = {Lecture Notes in Computer Science}, volume = {11214}, pages = {220--237}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01249-6\_14}, doi = {10.1007/978-3-030-01249-6\_14}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eccv/XiaoDLYLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/BhagojiH0S18, author = {Arjun Nitin Bhagoji and Warren He and Bo Li and Dawn Song}, title = {Black-box Attacks on Deep Neural Networks via Gradient Estimation}, booktitle = {6th International Conference on Learning Representations, {ICLR} 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Workshop Track Proceedings}, publisher = {OpenReview.net}, year = {2018}, url = {https://openreview.net/forum?id=SJ9nVSkvG}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/BhagojiH0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/ChenLS18, author = {Xinyun Chen and Chang Liu and Dawn Song}, title = {Towards Synthesizing Complex Programs From Input-Output Examples}, booktitle = {6th International Conference on Learning Representations, {ICLR} 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings}, publisher = {OpenReview.net}, year = {2018}, url = {https://openreview.net/forum?id=Skp1ESxRZ}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/ChenLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/ChenLS18a, author = {Xinyun Chen and Chang Liu and Dawn Song}, title = {Tree-to-tree Neural Networks for Program Translation}, booktitle = {6th International Conference on Learning Representations, {ICLR} 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Workshop Track Proceedings}, publisher = {OpenReview.net}, year = {2018}, url = {https://openreview.net/forum?id=H1xSvMh8M}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/ChenLS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/FoxSKGSS18, author = {Roy Fox and Richard Shin and Sanjay Krishnan and Ken Goldberg and Dawn Song and Ion Stoica}, title = {Parametrized Hierarchical Procedures for Neural Programming}, booktitle = {6th International Conference on Learning Representations, {ICLR} 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings}, publisher = {OpenReview.net}, year = {2018}, url = {https://openreview.net/forum?id=rJl63fZRb}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/FoxSKGSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/He0S18, author = {Warren He and Bo Li and Dawn Song}, title = {Decision Boundary Analysis of Adversarial Examples}, booktitle = {6th International Conference on Learning Representations, {ICLR} 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings}, publisher = {OpenReview.net}, year = {2018}, url = {https://openreview.net/forum?id=BkpiPMbA-}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/He0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/Ma0WEWSSHB18, author = {Xingjun Ma and Bo Li and Yisen Wang and Sarah M. Erfani and Sudanthi N. R. Wijewickrema and Grant Schoenebeck and Dawn Song and Michael E. Houle and James Bailey}, title = {Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality}, booktitle = {6th International Conference on Learning Representations, {ICLR} 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings}, publisher = {OpenReview.net}, year = {2018}, url = {https://openreview.net/forum?id=B1gJ1L2aW}, timestamp = {Sun, 27 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/Ma0WEWSSHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/PhilippSC18, author = {George Philipp and Dawn Song and Jaime G. Carbonell}, title = {Gradients explode - Deep Networks are shallow - ResNet explained}, booktitle = {6th International Conference on Learning Representations, {ICLR} 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Workshop Track Proceedings}, publisher = {OpenReview.net}, year = {2018}, url = {https://openreview.net/forum?id=rJjcdFkPM}, timestamp = {Thu, 04 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/PhilippSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/ShinPS18, author = {Richard Shin and Charles Packer and Dawn Song}, title = {Differentiable Neural Network Architecture Search}, booktitle = {6th International Conference on Learning Representations, {ICLR} 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Workshop Track Proceedings}, publisher = {OpenReview.net}, year = {2018}, url = {https://openreview.net/forum?id=BJ-MRKkwG}, timestamp = {Thu, 04 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/ShinPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/ShinPS18a, author = {Richard Shin and Illia Polosukhin and Dawn Song}, title = {Towards Specification-Directed Program Repair}, booktitle = {6th International Conference on Learning Representations, {ICLR} 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Workshop Track Proceedings}, publisher = {OpenReview.net}, year = {2018}, url = {https://openreview.net/forum?id=B1iZRFkwz}, timestamp = {Thu, 04 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/ShinPS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/XiaoZ0HLS18, author = {Chaowei Xiao and Jun{-}Yan Zhu and Bo Li and Warren He and Mingyan Liu and Dawn Song}, title = {Spatially Transformed Adversarial Examples}, booktitle = {6th International Conference on Learning Representations, {ICLR} 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings}, publisher = {OpenReview.net}, year = {2018}, url = {https://openreview.net/forum?id=HyydRMZC-}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/XiaoZ0HLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/CaiLS18, author = {Qi{-}Zhi Cai and Chang Liu and Dawn Song}, editor = {J{\'{e}}r{\^{o}}me Lang}, title = {Curriculum Adversarial Training}, booktitle = {Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, {IJCAI} 2018, July 13-19, 2018, Stockholm, Sweden}, pages = {3740--3747}, publisher = {ijcai.org}, year = {2018}, url = {https://doi.org/10.24963/ijcai.2018/520}, doi = {10.24963/IJCAI.2018/520}, timestamp = {Tue, 20 Aug 2019 16:19:08 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/CaiLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/XiaoLZHLS18, author = {Chaowei Xiao and Bo Li and Jun{-}Yan Zhu and Warren He and Mingyan Liu and Dawn Song}, editor = {J{\'{e}}r{\^{o}}me Lang}, title = {Generating Adversarial Examples with Adversarial Networks}, booktitle = {Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, {IJCAI} 2018, July 13-19, 2018, Stockholm, Sweden}, pages = {3905--3911}, publisher = {ijcai.org}, year = {2018}, url = {https://doi.org/10.24963/ijcai.2018/543}, doi = {10.24963/IJCAI.2018/543}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/XiaoLZHLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/LemieuxPSS18, author = {Caroline Lemieux and Rohan Padhye and Koushik Sen and Dawn Song}, editor = {Frank Tip and Eric Bodden}, title = {PerfFuzz: automatically generating pathological inputs}, booktitle = {Proceedings of the 27th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2018, Amsterdam, The Netherlands, July 16-21, 2018}, pages = {254--265}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3213846.3213874}, doi = {10.1145/3213846.3213874}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issta/LemieuxPSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ChenLS18, author = {Xinyun Chen and Chang Liu and Dawn Song}, editor = {Samy Bengio and Hanna M. Wallach and Hugo Larochelle and Kristen Grauman and Nicol{\`{o}} Cesa{-}Bianchi and Roman Garnett}, title = {Tree-to-tree Neural Networks for Program Translation}, booktitle = {Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr{\'{e}}al, Canada}, pages = {2552--2562}, year = {2018}, url = {https://proceedings.neurips.cc/paper/2018/hash/d759175de8ea5b1d9a2660e45554894f-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/ChenLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ShinPS18, author = {Richard Shin and Illia Polosukhin and Dawn Song}, editor = {Samy Bengio and Hanna M. Wallach and Hugo Larochelle and Kristen Grauman and Nicol{\`{o}} Cesa{-}Bianchi and Roman Garnett}, title = {Improving Neural Program Synthesis with Inferred Execution Traces}, booktitle = {Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr{\'{e}}al, Canada}, pages = {8931--8940}, year = {2018}, url = {https://proceedings.neurips.cc/paper/2018/hash/7776e88b0c189539098176589250bcba-Abstract.html}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/ShinPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KosFS18, author = {Jernej Kos and Ian Fischer and Dawn Song}, title = {Adversarial Examples for Generative Models}, booktitle = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San Francisco, CA, USA, May 24, 2018}, pages = {36--42}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SPW.2018.00014}, doi = {10.1109/SPW.2018.00014}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/KosFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiXLRWCZYS18, author = {Huichen Li and Xiaojun Xu and Chang Liu and Teng Ren and Kun Wu and Xuezhi Cao and Weinan Zhang and Yong Yu and Dawn Song}, title = {A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {53--69}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00034}, doi = {10.1109/SP.2018.00034}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LiXLRWCZYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/SongEEF0RTPK18, author = {Dawn Song and Kevin Eykholt and Ivan Evtimov and Earlence Fernandes and Bo Li and Amir Rahmati and Florian Tram{\`{e}}r and Atul Prakash and Tadayoshi Kohno}, editor = {Christian Rossow and Yves Younan}, title = {Physical Adversarial Examples for Object Detectors}, booktitle = {12th {USENIX} Workshop on Offensive Technologies, {WOOT} 2018, Baltimore, MD, USA, August 13-14, 2018}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/woot18/presentation/eykholt}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/woot/SongEEF0RTPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/mc/18/KuznetsovSPCSS18, author = {Volodymyr Kuznetsov and Laszlo Szekeres and Mathias Payer and George Candea and R. Sekar and Dawn Song}, editor = {Per Larsen and Ahmad{-}Reza Sadeghi}, title = {Code-pointer integrity}, booktitle = {The Continuing Arms Race: Code-Reuse Attacks and Defenses}, pages = {81--116}, publisher = {{ACM} / Morgan {\&} Claypool}, year = {2018}, url = {https://doi.org/10.1145/3129743.3129748}, doi = {10.1145/3129743.3129748}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/mc/18/KuznetsovSPCSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-02610, author = {Chaowei Xiao and Bo Li and Jun{-}Yan Zhu and Warren He and Mingyan Liu and Dawn Song}, title = {Generating Adversarial Examples with Adversarial Networks}, journal = {CoRR}, volume = {abs/1801.02610}, year = {2018}, url = {http://arxiv.org/abs/1801.02610}, eprinttype = {arXiv}, eprint = {1801.02610}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-02610.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-02612, author = {Chaowei Xiao and Jun{-}Yan Zhu and Bo Li and Warren He and Mingyan Liu and Dawn Song}, title = {Spatially Transformed Adversarial Examples}, journal = {CoRR}, volume = {abs/1801.02612}, year = {2018}, url = {http://arxiv.org/abs/1801.02612}, eprinttype = {arXiv}, eprint = {1801.02612}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-02612.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-02613, author = {Xingjun Ma and Bo Li and Yisen Wang and Sarah M. Erfani and Sudanthi N. R. Wijewickrema and Michael E. Houle and Grant Schoenebeck and Dawn Song and James Bailey}, title = {Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality}, journal = {CoRR}, volume = {abs/1801.02613}, year = {2018}, url = {http://arxiv.org/abs/1801.02613}, eprinttype = {arXiv}, eprint = {1801.02613}, timestamp = {Sun, 27 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-02613.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-03691, author = {Xinyun Chen and Chang Liu and Dawn Song}, title = {Tree-to-tree Neural Networks for Program Translation}, journal = {CoRR}, volume = {abs/1802.03691}, year = {2018}, url = {http://arxiv.org/abs/1802.03691}, eprinttype = {arXiv}, eprint = {1802.03691}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-03691.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-08232, author = {Nicholas Carlini and Chang Liu and Jernej Kos and {\'{U}}lfar Erlingsson and Dawn Song}, title = {The Secret Sharer: Measuring Unintended Neural Network Memorization {\&} Extracting Secrets}, journal = {CoRR}, volume = {abs/1802.08232}, year = {2018}, url = {http://arxiv.org/abs/1802.08232}, eprinttype = {arXiv}, eprint = {1802.08232}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-08232.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-02566, author = {Huichen Li and Xiaojun Xu and Chang Liu and Teng Ren and Kun Wu and Xuezhi Cao and Weinan Zhang and Yong Yu and Dawn Song}, title = {A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks}, journal = {CoRR}, volume = {abs/1804.02566}, year = {2018}, url = {http://arxiv.org/abs/1804.02566}, eprinttype = {arXiv}, eprint = {1804.02566}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-02566.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-05141, author = {Raymond Cheng and Fan Zhang and Jernej Kos and Warren He and Nicholas Hynes and Noah M. Johnson and Ari Juels and Andrew Miller and Dawn Song}, title = {Ekiden: {A} Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution}, journal = {CoRR}, volume = {abs/1804.05141}, year = {2018}, url = {http://arxiv.org/abs/1804.05141}, eprinttype = {arXiv}, eprint = {1804.05141}, timestamp = {Tue, 09 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-05141.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-04807, author = {Qi{-}Zhi Cai and Min Du and Chang Liu and Dawn Song}, title = {Curriculum Adversarial Training}, journal = {CoRR}, volume = {abs/1805.04807}, year = {2018}, url = {http://arxiv.org/abs/1805.04807}, eprinttype = {arXiv}, eprint = {1805.04807}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-04807.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-00608, author = {Daniel Huang and Prafulla Dhariwal and Dawn Song and Ilya Sutskever}, title = {GamePad: {A} Learning Environment for Theorem Proving}, journal = {CoRR}, volume = {abs/1806.00608}, year = {2018}, url = {http://arxiv.org/abs/1806.00608}, eprinttype = {arXiv}, eprint = {1806.00608}, timestamp = {Sun, 12 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-00608.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-06689, author = {Nick Hynes and Raymond Cheng and Dawn Song}, title = {Efficient Deep Learning on Multi-Source Private Data}, journal = {CoRR}, volume = {abs/1807.06689}, year = {2018}, url = {http://arxiv.org/abs/1807.06689}, eprinttype = {arXiv}, eprint = {1807.06689}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-06689.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-07769, author = {Kevin Eykholt and Ivan Evtimov and Earlence Fernandes and Bo Li and Amir Rahmati and Florian Tram{\`{e}}r and Atul Prakash and Tadayoshi Kohno and Dawn Song}, title = {Physical Adversarial Examples for Object Detectors}, journal = {CoRR}, volume = {abs/1807.07769}, year = {2018}, url = {http://arxiv.org/abs/1807.07769}, eprinttype = {arXiv}, eprint = {1807.07769}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-07769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-07750, author = {Noah M. Johnson and Joseph P. Near and Joseph M. Hellerstein and Dawn Song}, title = {Chorus: Differential Privacy via Query Rewriting}, journal = {CoRR}, volume = {abs/1809.07750}, year = {2018}, url = {http://arxiv.org/abs/1809.07750}, eprinttype = {arXiv}, eprint = {1809.07750}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-07750.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-10875, author = {Zhuolin Yang and Bo Li and Pin{-}Yu Chen and Dawn Song}, title = {Characterizing Audio Adversarial Examples Using Temporal Dependency}, journal = {CoRR}, volume = {abs/1809.10875}, year = {2018}, url = {http://arxiv.org/abs/1809.10875}, eprinttype = {arXiv}, eprint = {1809.10875}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-10875.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-05162, author = {Chaowei Xiao and Ruizhi Deng and Bo Li and Fisher Yu and Mingyan Liu and Dawn Song}, title = {Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation}, journal = {CoRR}, volume = {abs/1810.05162}, year = {2018}, url = {http://arxiv.org/abs/1810.05162}, eprinttype = {arXiv}, eprint = {1810.05162}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-05162.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-12282, author = {Charles Packer and Katelyn Gao and Jernej Kos and Philipp Kr{\"{a}}henb{\"{u}}hl and Vladlen Koltun and Dawn Song}, title = {Assessing Generalization in Deep Reinforcement Learning}, journal = {CoRR}, volume = {abs/1810.12282}, year = {2018}, url = {http://arxiv.org/abs/1810.12282}, eprinttype = {arXiv}, eprint = {1810.12282}, timestamp = {Thu, 01 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-12282.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-12881, author = {Mingjie Sun and Jian Tang and Huichen Li and Bo Li and Chaowei Xiao and Yao Chen and Dawn Song}, title = {Data Poisoning Attack against Unsupervised Node Embedding Methods}, journal = {CoRR}, volume = {abs/1810.12881}, year = {2018}, url = {http://arxiv.org/abs/1810.12881}, eprinttype = {arXiv}, eprint = {1810.12881}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-12881.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-10605, author = {Ilia A. Lebedev and Kyle Hogan and Jules Drean and David Kohlbrenner and Dayeol Lee and Krste Asanovic and Dawn Song and Srinivas Devadas}, title = {Sanctorum: {A} lightweight security monitor for secure enclaves}, journal = {CoRR}, volume = {abs/1812.10605}, year = {2018}, url = {http://arxiv.org/abs/1812.10605}, eprinttype = {arXiv}, eprint = {1812.10605}, timestamp = {Thu, 03 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-10605.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talg/ShiCRS17, author = {Elaine Shi and T.{-}H. Hubert Chan and Eleanor Gilbert Rieffel and Dawn Song}, title = {Distributed Private Data Analysis: Lower Bounds and Practical Constructions}, journal = {{ACM} Trans. Algorithms}, volume = {13}, number = {4}, pages = {50:1--50:38}, year = {2017}, url = {https://doi.org/10.1145/3146549}, doi = {10.1145/3146549}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/talg/ShiCRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuLFYSS17, author = {Xiaojun Xu and Chang Liu and Qian Feng and Heng Yin and Le Song and Dawn Song}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {363--376}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134018}, doi = {10.1145/3133956.3134018}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuLFYSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/GongOWCSSJB17, author = {Neil Zhenqiang Gong and Altay Ozen and Yu Wu and Xiaoyu Cao and Richard Shin and Dawn Song and Hongxia Jin and Xuan Bao}, editor = {Kisung Lee and Ling Liu}, title = {{PIANO:} Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2212--2219}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.68}, doi = {10.1109/ICDCS.2017.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/GongOWCSSJB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/CaiSS17, author = {Jonathon Cai and Richard Shin and Dawn Song}, title = {Making Neural Programming Architectures Generalize via Recursion}, booktitle = {5th International Conference on Learning Representations, {ICLR} 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings}, publisher = {OpenReview.net}, year = {2017}, url = {https://openreview.net/forum?id=BkbY4psgg}, timestamp = {Thu, 04 Apr 2019 13:20:07 +0200}, biburl = {https://dblp.org/rec/conf/iclr/CaiSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/KosS17, author = {Jernej Kos and Dawn Song}, title = {Delving into adversarial attacks on deep policies}, booktitle = {5th International Conference on Learning Representations, {ICLR} 2017, Toulon, France, April 24-26, 2017, Workshop Track Proceedings}, publisher = {OpenReview.net}, year = {2017}, url = {https://openreview.net/forum?id=BJcib5mFe}, timestamp = {Thu, 04 Apr 2019 13:20:08 +0200}, biburl = {https://dblp.org/rec/conf/iclr/KosS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/LiuCLS17, author = {Yanpei Liu and Xinyun Chen and Chang Liu and Dawn Song}, title = {Delving into Transferable Adversarial Examples and Black-box Attacks}, booktitle = {5th International Conference on Learning Representations, {ICLR} 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings}, publisher = {OpenReview.net}, year = {2017}, url = {https://openreview.net/forum?id=Sys6GJqxl}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/LiuCLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/HeWCCS17, author = {Warren He and James Wei and Xinyun Chen and Nicholas Carlini and Dawn Song}, editor = {William Enck and Collin Mulliner}, title = {Adversarial Example Defense: Ensembles of Weak Defenses are not Strong}, booktitle = {11th {USENIX} Workshop on Offensive Technologies, {WOOT} 2017, Vancouver, BC, Canada, August 14-15, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/he}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/HeWCCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/FrankHJKMMPSS17, author = {Mario Frank and Tiffany Hwu and Sakshi Jain and Robert T. Knight and Ivan Martinovic and Prateek Mittal and Daniele Perito and Ivo Sluganovic and Dawn Song}, editor = {Bhavani Thuraisingham and Adam J. Lee}, title = {Using EEG-Based {BCI} Devices to Subliminally Probe for Private Information}, booktitle = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017}, pages = {133--136}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139550.3139559}, doi = {10.1145/3139550.3139559}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/wpes/FrankHJKMMPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KosFS17, author = {Jernej Kos and Ian Fischer and Dawn Song}, title = {Adversarial examples for generative models}, journal = {CoRR}, volume = {abs/1702.06832}, year = {2017}, url = {http://arxiv.org/abs/1702.06832}, eprinttype = {arXiv}, eprint = {1702.06832}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KosFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GongOWCSSJB17, author = {Neil Zhenqiang Gong and Altay Ozen and Yu Wu and Xiaoyu Cao and Eui Chul Richard Shin and Dawn Xiaodong Song and Hongxia Jin and Xuan Bao}, title = {{PIANO:} Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices}, journal = {CoRR}, volume = {abs/1704.03118}, year = {2017}, url = {http://arxiv.org/abs/1704.03118}, eprinttype = {arXiv}, eprint = {1704.03118}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GongOWCSSJB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CaiSS17, author = {Jonathon Cai and Richard Shin and Dawn Song}, title = {Making Neural Programming Architectures Generalize via Recursion}, journal = {CoRR}, volume = {abs/1704.06611}, year = {2017}, url = {http://arxiv.org/abs/1704.06611}, eprinttype = {arXiv}, eprint = {1704.06611}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CaiSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KosS17, author = {Jernej Kos and Dawn Song}, title = {Delving into adversarial attacks on deep policies}, journal = {CoRR}, volume = {abs/1705.06452}, year = {2017}, url = {http://arxiv.org/abs/1705.06452}, eprinttype = {arXiv}, eprint = {1705.06452}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KosS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenLS17a, author = {Xinyun Chen and Chang Liu and Dawn Song}, title = {Learning Neural Programs To Parse Programs}, journal = {CoRR}, volume = {abs/1706.01284}, year = {2017}, url = {http://arxiv.org/abs/1706.01284}, eprinttype = {arXiv}, eprint = {1706.01284}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenLS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HeWCCS17, author = {Warren He and James Wei and Xinyun Chen and Nicholas Carlini and Dawn Song}, title = {Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong}, journal = {CoRR}, volume = {abs/1706.04701}, year = {2017}, url = {http://arxiv.org/abs/1706.04701}, eprinttype = {arXiv}, eprint = {1706.04701}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HeWCCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JohnsonNS17, author = {Noah M. Johnson and Joseph P. Near and Dawn Xiaodong Song}, title = {Practical Differential Privacy for {SQL} Queries Using Elastic Sensitivity}, journal = {CoRR}, volume = {abs/1706.09479}, year = {2017}, url = {http://arxiv.org/abs/1706.09479}, eprinttype = {arXiv}, eprint = {1706.09479}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JohnsonNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/EvtimovEFKLPRS17, author = {Ivan Evtimov and Kevin Eykholt and Earlence Fernandes and Tadayoshi Kohno and Bo Li and Atul Prakash and Amir Rahmati and Dawn Song}, title = {Robust Physical-World Attacks on Machine Learning Models}, journal = {CoRR}, volume = {abs/1707.08945}, year = {2017}, url = {http://arxiv.org/abs/1707.08945}, eprinttype = {arXiv}, eprint = {1707.08945}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/EvtimovEFKLPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-06525, author = {Xiaojun Xu and Chang Liu and Qian Feng and Heng Yin and Le Song and Dawn Song}, title = {Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection}, journal = {CoRR}, volume = {abs/1708.06525}, year = {2017}, url = {http://arxiv.org/abs/1708.06525}, eprinttype = {arXiv}, eprint = {1708.06525}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-06525.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-08693, author = {Xiaojun Xu and Xinyun Chen and Chang Liu and Anna Rohrbach and Trevor Darrell and Dawn Song}, title = {Can you fool {AI} with adversarial examples on a visual Turing test?}, journal = {CoRR}, volume = {abs/1709.08693}, year = {2017}, url = {http://arxiv.org/abs/1709.08693}, eprinttype = {arXiv}, eprint = {1709.08693}, timestamp = {Tue, 23 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-08693.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-04436, author = {Xiaojun Xu and Chang Liu and Dawn Song}, title = {SQLNet: Generating Structured Queries From Natural Language Without Reinforcement Learning}, journal = {CoRR}, volume = {abs/1711.04436}, year = {2017}, url = {http://arxiv.org/abs/1711.04436}, eprinttype = {arXiv}, eprint = {1711.04436}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-04436.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-05526, author = {Xinyun Chen and Chang Liu and Bo Li and Kimberly Lu and Dawn Song}, title = {Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning}, journal = {CoRR}, volume = {abs/1712.05526}, year = {2017}, url = {http://arxiv.org/abs/1712.05526}, eprinttype = {arXiv}, eprint = {1712.05526}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-05526.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-05577, author = {George Philipp and Dawn Song and Jaime G. Carbonell}, title = {Gradients explode - Deep Networks are shallow - ResNet explained}, journal = {CoRR}, volume = {abs/1712.05577}, year = {2017}, url = {http://arxiv.org/abs/1712.05577}, eprinttype = {arXiv}, eprint = {1712.05577}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-05577.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-05855, author = {Ion Stoica and Dawn Song and Raluca Ada Popa and David A. Patterson and Michael W. Mahoney and Randy H. Katz and Anthony D. Joseph and Michael I. Jordan and Joseph M. Hellerstein and Joseph E. Gonzalez and Ken Goldberg and Ali Ghodsi and David E. Culler and Pieter Abbeel}, title = {A Berkeley View of Systems Challenges for {AI}}, journal = {CoRR}, volume = {abs/1712.05855}, year = {2017}, url = {http://arxiv.org/abs/1712.05855}, eprinttype = {arXiv}, eprint = {1712.05855}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-05855.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-08062, author = {Kevin Eykholt and Ivan Evtimov and Earlence Fernandes and Bo Li and Dawn Song and Tadayoshi Kohno and Amir Rahmati and Atul Prakash and Florian Tram{\`{e}}r}, title = {Note on Attacking Object Detectors with Adversarial Stickers}, journal = {CoRR}, volume = {abs/1712.08062}, year = {2017}, url = {http://arxiv.org/abs/1712.08062}, eprinttype = {arXiv}, eprint = {1712.08062}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-08062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-09491, author = {Arjun Nitin Bhagoji and Warren He and Bo Li and Dawn Song}, title = {Exploring the Space of Black-box Attacks on Deep Neural Networks}, journal = {CoRR}, volume = {abs/1712.09491}, year = {2017}, url = {http://arxiv.org/abs/1712.09491}, eprinttype = {arXiv}, eprint = {1712.09491}, timestamp = {Thu, 09 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-09491.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MillerXCSS16, author = {Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {The Honey Badger of {BFT} Protocols}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {31--42}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978399}, doi = {10.1145/2976749.2978399}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MillerXCSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HoLMHSW16, author = {Grant Ho and Derek Leung and Pratyush Mishra and Ashkan Hosseini and Dawn Song and David A. Wagner}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Smart Locks: Lessons for Securing Commodity Internet of Things Devices}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {461--472}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897886}, doi = {10.1145/2897845.2897886}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HoLMHSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CromanDEGJKMSSS16, author = {Kyle Croman and Christian Decker and Ittay Eyal and Adem Efe Gencer and Ari Juels and Ahmed E. Kosba and Andrew Miller and Prateek Saxena and Elaine Shi and Emin G{\"{u}}n Sirer and Dawn Song and Roger Wattenhofer}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {On Scaling Decentralized Blockchains - {(A} Position Paper)}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {106--125}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_8}, doi = {10.1007/978-3-662-53357-4\_8}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CromanDEGJKMSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmcad/Song16, author = {Dawn Song}, editor = {Ruzica Piskac and Muralidhar Talupur}, title = {Formal verification for computer security: Lessons learned and future directions}, booktitle = {2016 Formal Methods in Computer-Aided Design, {FMCAD} 2016, Mountain View, CA, USA, October 3-6, 2016}, pages = {1}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/FMCAD.2016.7886647}, doi = {10.1109/FMCAD.2016.7886647}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/fmcad/Song16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/KatzSS16, author = {Gilad Katz and Eui Chul Richard Shin and Dawn Song}, editor = {Francesco Bonchi and Josep Domingo{-}Ferrer and Ricardo Baeza{-}Yates and Zhi{-}Hua Zhou and Xindong Wu}, title = {ExploreKit: Automatic Feature Generation and Selection}, booktitle = {{IEEE} 16th International Conference on Data Mining, {ICDM} 2016, December 12-15, 2016, Barcelona, Spain}, pages = {979--984}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICDM.2016.0123}, doi = {10.1109/ICDM.2016.0123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/KatzSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangSCPLDS16, author = {Chao Zhang and Dawn Song and Scott A. Carr and Mathias Payer and Tongxin Li and Yu Ding and Chengyu Song}, title = {VTrust: Regaining Trust on Virtual Calls}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/vtrust-regaining-trust-virtual-calls.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ZhangSCPLDS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/LiuCSCS16, author = {Chang Liu and Xinyun Chen and Eui Chul Richard Shin and Mingcheng Chen and Dawn Xiaodong Song}, editor = {Daniel D. Lee and Masashi Sugiyama and Ulrike von Luxburg and Isabelle Guyon and Roman Garnett}, title = {Latent Attention For If-Then Program Synthesis}, booktitle = {Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain}, pages = {4574--4582}, year = {2016}, url = {https://proceedings.neurips.cc/paper/2016/hash/716e1b8c6cd17b771da77391355749f3-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/LiuCSCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenLSSC16, author = {Xinyun Chen and Chang Liu and Eui Chul Richard Shin and Dawn Song and Mingcheng Chen}, title = {Latent Attention For If-Then Program Synthesis}, journal = {CoRR}, volume = {abs/1611.01867}, year = {2016}, url = {http://arxiv.org/abs/1611.01867}, eprinttype = {arXiv}, eprint = {1611.01867}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenLSSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiuCLS16, author = {Yanpei Liu and Xinyun Chen and Chang Liu and Dawn Song}, title = {Delving into Transferable Adversarial Examples and Black-box Attacks}, journal = {CoRR}, volume = {abs/1611.02770}, year = {2016}, url = {http://arxiv.org/abs/1611.02770}, eprinttype = {arXiv}, eprint = {1611.02770}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiuCLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MillerXCSS16, author = {Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song}, title = {The Honey Badger of {BFT} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2016}, url = {http://eprint.iacr.org/2016/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MillerXCSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/ChenHADMS15, author = {Kevin Zhijie Chen and Warren He and Devdatta Akhawe and Vijay D'Silva and Prateek Mittal and Dawn Song}, editor = {George Candea}, title = {{ASPIRE:} Iterative Specification Synthesis for Security}, booktitle = {15th Workshop on Hot Topics in Operating Systems, HotOS XV, Kartause Ittingen, Switzerland, May 18-20, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/hotos15/workshop-program/presentation/chen\_kevin}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/hotos/ChenHADMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangNCSCS15, author = {Chao Zhang and Mehrdad Niknami and Kevin Zhijie Chen and Chengyu Song and Zhaofeng Chen and Dawn Song}, title = {JITScope: Protecting web users from control-flow hijacking attacks}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {567--575}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218424}, doi = {10.1109/INFOCOM.2015.7218424}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangNCSCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangSCCS15, author = {Chao Zhang and Chengyu Song and Kevin Zhijie Chen and Zhaofeng Chen and Dawn Song}, title = {VTint: Protecting Virtual Function Tables' Integrity}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/vtint-protecting-virtual-function-tables-integrity}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhangSCCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DSilvaPS15, author = {Vijay D'Silva and Mathias Payer and Dawn Xiaodong Song}, title = {The Correctness-Security Gap in Compiler Optimization}, booktitle = {2015 {IEEE} Symposium on Security and Privacy Workshops, {SPW} 2015, San Jose, CA, USA, May 21-22, 2015}, pages = {73--87}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SPW.2015.33}, doi = {10.1109/SPW.2015.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/DSilvaPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShinSM15, author = {Eui Chul Richard Shin and Dawn Song and Reza Moazzezi}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Recognizing Functions in Binaries with Neural Networks}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {611--626}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/shin}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/ShinSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/GongTMHSSSS14, author = {Neil Zhenqiang Gong and Ameet Talwalkar and Lester W. Mackey and Ling Huang and Eui Chul Richard Shin and Emil Stefanov and Elaine Shi and Dawn Song}, title = {Joint Link Prediction and Attribute Inference Using a Social-Attribute Network}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {5}, number = {2}, pages = {27:1--27:20}, year = {2014}, url = {https://doi.org/10.1145/2594455}, doi = {10.1145/2594455}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tist/GongTMHSSSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeAJSS14, author = {Warren He and Devdatta Akhawe and Sumeet Jain and Elaine Shi and Dawn Xiaodong Song}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {ShadowCrypt: Encrypted Web Applications for Everyone}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1028--1039}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660326}, doi = {10.1145/2660267.2660326}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeAJSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/KuznetsovSPCSS14, author = {Volodymyr Kuznetsov and Laszlo Szekeres and Mathias Payer and George Candea and R. Sekar and Dawn Song}, editor = {Jason Flinn and Hank Levy}, title = {Code-Pointer Integrity}, booktitle = {11th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} '14, Broomfield, CO, USA, October 6-8, 2014}, pages = {147--163}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/osdi14/technical-sessions/presentation/kuznetsov}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/osdi/KuznetsovSPCSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiHAS14, author = {Zhiwei Li and Warren He and Devdatta Akhawe and Dawn Song}, editor = {Kevin Fu and Jaeyeon Jung}, title = {The Emperor's New Password Manager: Security Analysis of Web-based Password Managers}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {465--479}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/li\_zhiwei}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/LiHAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/AkhaweHLMS14, author = {Devdatta Akhawe and Warren He and Zhiwei Li and Reza Moazzezi and Dawn Song}, editor = {Sergey Bratus and Felix "FX" Lindner}, title = {Clickjacking Revisited: {A} Perceptual View of {UI} Security}, booktitle = {8th {USENIX} Workshop on Offensive Technologies, {WOOT} '14, San Diego, CA, USA, August 19, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/woot14/workshop-program/presentation/akhawe}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/AkhaweHLMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/YinS13, author = {Heng Yin and Dawn Song}, title = {Automatic Malware Analysis - An Emulator Based Approach}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5523-3}, doi = {10.1007/978-1-4614-5523-3}, isbn = {978-1-4614-5522-6}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/sbcs/YinS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CaballeroS13, author = {Juan Caballero and Dawn Song}, title = {Automatic protocol reverse-engineering: Message format extraction and field semantics inference}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {451--474}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.08.003}, doi = {10.1016/J.COMNET.2012.08.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CaballeroS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FrankBMMS13, author = {Mario Frank and Ralf Biedert and Eugene Ma and Ivan Martinovic and Dawn Song}, title = {Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {1}, pages = {136--148}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2012.2225048}, doi = {10.1109/TIFS.2012.2225048}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FrankBMMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaasLSTSAKS13, author = {Martin Maas and Eric Love and Emil Stefanov and Mohit Tiwari and Elaine Shi and Krste Asanovic and John Kubiatowicz and Dawn Song}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{PHANTOM:} practical oblivious computation in a secure processor}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {311--324}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516692}, doi = {10.1145/2508859.2516692}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaasLSTSAKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CaseldenBPMS13, author = {Dan Caselden and Alex Bazhanyuk and Mathias Payer and Stephen McCamant and Dawn Song}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {{HI-CFG:} Construction by Binary Analysis and Application to Attack Polymorphism}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {164--181}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_10}, doi = {10.1007/978-3-642-40203-6\_10}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CaseldenBPMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AkhaweLHSS13, author = {Devdatta Akhawe and Frank Li and Warren He and Prateek Saxena and Dawn Song}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Data-Confined {HTML5} Applications}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {736--754}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_41}, doi = {10.1007/978-3-642-40203-6\_41}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AkhaweLHSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/DaiTWNS13, author = {Shuaifu Dai and Alok Tongaonkar and Xiaoyin Wang and Antonio Nucci and Dawn Song}, title = {NetworkProfiler: Towards automatic fingerprinting of Android apps}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {809--817}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6566868}, doi = {10.1109/INFCOM.2013.6566868}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/DaiTWNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/ChoDS13, author = {Chia Yuan Cho and Vijay D'Silva and Dawn Song}, editor = {Ewen Denney and Tevfik Bultan and Andreas Zeller}, title = {{BLITZ:} Compositional bounded model checking for real-world programs}, booktitle = {2013 28th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2013, Silicon Valley, CA, USA, November 11-15, 2013}, pages = {136--146}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ASE.2013.6693074}, doi = {10.1109/ASE.2013.6693074}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/kbse/ChoDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenJDDMMWRS13, author = {Kevin Zhijie Chen and Noah M. Johnson and Vijay D'Silva and Shuaifu Dai and Kyle MacNamara and Thomas R. Magrino and Edward XueJun Wu and Martin C. Rinard and Dawn Xiaodong Song}, title = {Contextual Policy Enforcement in Android Applications with Permission Event Graphs}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/contextual-policy-enforcement-android-applications-permission-event-graphs}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ChenJDDMMWRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MittalPS13, author = {Prateek Mittal and Charalampos Papamanthou and Dawn Xiaodong Song}, title = {Preserving Link Privacy in Social Network Based Systems}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/preserving-link-privacy-social-network-based-systems}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MittalPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/TongaonkarDNS13, author = {Alok Tongaonkar and Shuaifu Dai and Antonio Nucci and Dawn Song}, editor = {Matthew Roughan and Rocky K. C. Chang}, title = {Understanding Mobile App Usage Patterns Using In-App Advertisements}, booktitle = {Passive and Active Measurement - 14th International Conference, {PAM} 2013, Hong Kong, China, March 18-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7799}, pages = {63--72}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36516-4\_7}, doi = {10.1007/978-3-642-36516-4\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/pam/TongaonkarDNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prisms/BoehmCFHKLMS13, author = {Arman Boehm and Dongqu Chen and Mario Frank and Ling Huang and Cynthia Kuo and Tihomir Lolic and Ivan Martinovic and Dawn Song}, title = {{SAFE:} Secure authentication with Face and Eyes}, booktitle = {2013 International Conference on Privacy and Security in Mobile Systems, {PRISMS} 2013, Atlantic City, NJ, USA, June 24-27, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/PRISMS.2013.6927175}, doi = {10.1109/PRISMS.2013.6927175}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prisms/BoehmCFHKLMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SzekeresPWS13, author = {Laszlo Szekeres and Mathias Payer and Tao Wei and Dawn Song}, title = {SoK: Eternal War in Memory}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {48--62}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.13}, doi = {10.1109/SP.2013.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SzekeresPWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangWCDSMSZ13, author = {Chao Zhang and Tao Wei and Zhaofeng Chen and Lei Duan and Laszlo Szekeres and Stephen McCamant and Dawn Song and Wei Zou}, title = {Practical Control Flow Integrity and Randomization for Binary Executables}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {559--573}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.44}, doi = {10.1109/SP.2013.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhangWCDSMSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-6309, author = {Neil Zhenqiang Gong and Wenchang Xu and Dawn Song}, title = {Reciprocity in Social Networks: Measurements, Predictions, and Implications}, journal = {CoRR}, volume = {abs/1302.6309}, year = {2013}, url = {http://arxiv.org/abs/1302.6309}, eprinttype = {arXiv}, eprint = {1302.6309}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-6309.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FrankHJKMMPS13, author = {Mario Frank and Tiffany Hwu and Sakshi Jain and Robert T. Knight and Ivan Martinovic and Prateek Mittal and Daniele Perito and Dawn Song}, title = {Subliminal Probing for Private Information via EEG-Based {BCI} Devices}, journal = {CoRR}, volume = {abs/1312.6052}, year = {2013}, url = {http://arxiv.org/abs/1312.6052}, eprinttype = {arXiv}, eprint = {1312.6052}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FrankHJKMMPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SongSFS12, author = {Dawn Song and Elaine Shi and Ian Fischer and Umesh Shankar}, title = {Cloud Data Protection for the Masses}, journal = {Computer}, volume = {45}, number = {1}, pages = {39--45}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.1}, doi = {10.1109/MC.2012.1}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SongSFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/BabicRS12, author = {Domagoj Babic and Daniel Reynaud and Dawn Song}, title = {Recognizing malicious software behaviors with tree automata inference}, journal = {Formal Methods Syst. Des.}, volume = {41}, number = {1}, pages = {107--128}, year = {2012}, url = {https://doi.org/10.1007/s10703-012-0149-1}, doi = {10.1007/S10703-012-0149-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/BabicRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BarthRSMSB12, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Song and Peter L. Bartlett}, title = {A Learning-Based Approach to Reactive Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {482--493}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.42}, doi = {10.1109/TDSC.2011.42}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BarthRSMSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/MartignoniMPSM12, author = {Lorenzo Martignoni and Stephen McCamant and Pongsin Poosankam and Dawn Song and Petros Maniatis}, editor = {Tim Harris and Michael L. Scott}, title = {Path-exploration lifting: hi-fi tests for lo-fi emulators}, booktitle = {Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, {ASPLOS} 2012, London, UK, March 3-7, 2012}, pages = {337--348}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2150976.2151012}, doi = {10.1145/2150976.2151012}, timestamp = {Wed, 07 Jul 2021 13:23:08 +0200}, biburl = {https://dblp.org/rec/conf/asplos/MartignoniMPSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/HannaHWLCS12, author = {Steve Hanna and Ling Huang and Edward XueJun Wu and Saung Li and Charles Chen and Dawn Song}, editor = {Ulrich Flegel and Evangelos P. Markatos and William K. Robertson}, title = {Juxtapp: {A} Scalable System for Detecting Code Reuse among Android Applications}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7591}, pages = {62--81}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37300-8\_4}, doi = {10.1007/978-3-642-37300-8\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/HannaHWLCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esa/ChanSS12, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, editor = {Leah Epstein and Paolo Ferragina}, title = {Optimal Lower Bound for Differentially Private Multi-party Aggregation}, booktitle = {Algorithms - {ESA} 2012 - 20th Annual European Symposium, Ljubljana, Slovenia, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7501}, pages = {277--288}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33090-2\_25}, doi = {10.1007/978-3-642-33090-2\_25}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/esa/ChanSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChanSS12, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, editor = {Angelos D. Keromytis}, title = {Privacy-Preserving Stream Aggregation with Fault Tolerance}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {200--214}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_15}, doi = {10.1007/978-3-642-32946-3\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChanSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/FrankDFS12, author = {Mario Frank and Ben Dong and Adrienne Porter Felt and Dawn Song}, editor = {Mohammed Javeed Zaki and Arno Siebes and Jeffrey Xu Yu and Bart Goethals and Geoffrey I. Webb and Xindong Wu}, title = {Mining Permission Request Patterns from Android and Facebook Applications}, booktitle = {12th {IEEE} International Conference on Data Mining, {ICDM} 2012, Brussels, Belgium, December 10-13, 2012}, pages = {870--875}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDM.2012.86}, doi = {10.1109/ICDM.2012.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/FrankDFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/SmithBKSGF12, author = {Samuel Smith and Jae Yeon (Claire) Baek and Zhaoyi Kang and Dawn Song and Laurent El Ghaoui and Mario Frank}, title = {Predicting Congressional Votes Based on Campaign Finance Data}, booktitle = {11th International Conference on Machine Learning and Applications, ICMLA, Boca Raton, FL, USA, December 12-15, 2012. Volume 1}, pages = {640--645}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICMLA.2012.119}, doi = {10.1109/ICMLA.2012.119}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmla/SmithBKSGF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/GongXHMSSS12, author = {Neil Zhenqiang Gong and Wenchang Xu and Ling Huang and Prateek Mittal and Emil Stefanov and Vyas Sekar and Dawn Song}, editor = {John W. Byers and Jim Kurose and Ratul Mahajan and Alex C. Snoeren}, title = {Evolution of social-attribute networks: measurements, modeling, and implications using google+}, booktitle = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '12, Boston, MA, USA, November 14-16, 2012}, pages = {131--144}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2398776.2398792}, doi = {10.1145/2398776.2398792}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/GongXHMSSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/MaganisSCS12, author = {Gabriel Maganis and Elaine Shi and Hao Chen and Dawn Song}, editor = {Nigel Davies and Srinivasan Seshan and Lin Zhong}, title = {Opaak: using mobile phones to limit anonymous identities online}, booktitle = {The 10th International Conference on Mobile Systems, Applications, and Services, MobiSys'12, Ambleside, United Kingdom - June 25 - 29, 2012}, pages = {295--308}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2307636.2307664}, doi = {10.1145/2307636.2307664}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/MaganisSCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ReynaudSMWS12, author = {Daniel Reynaud and Dawn Xiaodong Song and Thomas R. Magrino and Edward XueJun Wu and Eui Chul Richard Shin}, title = {FreeMarket: Shopping for free in Android applications}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/freemarket-shopping-free-android-applications}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ReynaudSMWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/StefanovSS12, author = {Emil Stefanov and Elaine Shi and Dawn Xiaodong Song}, title = {Towards Practical Oblivious {RAM}}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/towards-practical-oblivious-ram}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/StefanovSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/StefanovSS12, author = {Emil Stefanov and Elaine Shi and Dawn Song}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {413--430}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_25}, doi = {10.1007/978-3-642-30057-8\_25}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/StefanovSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/MohanTSSC12, author = {Prashanth Mohan and Abhradeep Thakurta and Elaine Shi and Dawn Song and David E. Culler}, editor = {K. Sel{\c{c}}uk Candan and Yi Chen and Richard T. Snodgrass and Luis Gravano and Ariel Fuxman}, title = {{GUPT:} privacy preserving data analysis made easy}, booktitle = {Proceedings of the {ACM} {SIGMOD} International Conference on Management of Data, {SIGMOD} 2012, Scottsdale, AZ, USA, May 20-24, 2012}, pages = {349--360}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2213836.2213876}, doi = {10.1145/2213836.2213876}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/MohanTSSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NarayananPGBSSS12, author = {Arvind Narayanan and Hristo S. Paskov and Neil Zhenqiang Gong and John Bethencourt and Emil Stefanov and Eui Chul Richard Shin and Dawn Song}, title = {On the Feasibility of Internet-Scale Author Identification}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {300--314}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.46}, doi = {10.1109/SP.2012.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/NarayananPGBSSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/MartignoniPZHMSPPSS12, author = {Lorenzo Martignoni and Pongsin Poosankam and Matei Zaharia and Jun Han and Stephen McCamant and Dawn Song and Vern Paxson and Adrian Perrig and Scott Shenker and Ion Stoica}, editor = {Gernot Heiser and Wilson C. Hsieh}, title = {Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems}, booktitle = {2012 {USENIX} Annual Technical Conference, Boston, MA, USA, June 13-15, 2012}, pages = {165--182}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/atc12/technical-sessions/presentation/martignoni}, timestamp = {Mon, 01 Feb 2021 08:43:32 +0100}, biburl = {https://dblp.org/rec/conf/usenix/MartignoniPZHMSPPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MartinovicDFPRS12, author = {Ivan Martinovic and Doug Davies and Mario Frank and Daniele Perito and Tomas Ros and Dawn Song}, editor = {Tadayoshi Kohno}, title = {On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {143--158}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/martinovic}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MartinovicDFPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AkhaweSS12, author = {Devdatta Akhawe and Prateek Saxena and Dawn Song}, editor = {Tadayoshi Kohno}, title = {Privilege Separation in {HTML5} Applications}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {429--444}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/akhawe}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AkhaweSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TiwariMOASLSA12, author = {Mohit Tiwari and Prashanth Mohan and Andrew Osheroff and Hilfi Alkaff and Elaine Shi and Eric Love and Dawn Song and Krste Asanovic}, editor = {Patrick Traynor}, title = {Context-centric Security}, booktitle = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue, WA, USA, August 7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/tiwari}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/TiwariMOASLSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-6231, author = {Mario Frank and Ralf Biedert and Eugene Ma and Ivan Martinovic and Dawn Song}, title = {Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication}, journal = {CoRR}, volume = {abs/1207.6231}, year = {2012}, url = {http://arxiv.org/abs/1207.6231}, eprinttype = {arXiv}, eprint = {1207.6231}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-6231.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-6189, author = {Prateek Mittal and Charalampos Papamanthou and Dawn Song}, title = {Preserving Link Privacy in Social Network Based Systems}, journal = {CoRR}, volume = {abs/1208.6189}, year = {2012}, url = {http://arxiv.org/abs/1208.6189}, eprinttype = {arXiv}, eprint = {1208.6189}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-6189.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-0835, author = {Neil Zhenqiang Gong and Wenchang Xu and Ling Huang and Prateek Mittal and Emil Stefanov and Vyas Sekar and Dawn Song}, title = {Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+}, journal = {CoRR}, volume = {abs/1209.0835}, year = {2012}, url = {http://arxiv.org/abs/1209.0835}, eprinttype = {arXiv}, eprint = {1209.0835}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-0835.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-2429, author = {Mario Frank and Ben Dong and Adrienne Porter Felt and Dawn Song}, title = {Mining Permission Request Patterns from Android and Facebook Applications (extended author version)}, journal = {CoRR}, volume = {abs/1210.2429}, year = {2012}, url = {http://arxiv.org/abs/1210.2429}, eprinttype = {arXiv}, eprint = {1210.2429}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-2429.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanSS12, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, title = {Optimal Lower Bound for Differentially Private Multi-Party Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2012}, url = {http://eprint.iacr.org/2012/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftdb/ChanHPS11, author = {Haowen Chan and Hsu{-}Chun Hsiao and Adrian Perrig and Dawn Song}, title = {Secure Distributed Data Aggregation}, journal = {Found. Trends Databases}, volume = {3}, number = {3}, pages = {149--201}, year = {2011}, url = {https://doi.org/10.1561/1900000025}, doi = {10.1561/1900000025}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftdb/ChanHPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/ZhuJSKW11, author = {David (Yu) Zhu and Jaeyeon Jung and Dawn Song and Tadayoshi Kohno and David Wetherall}, title = {TaintEraser: protecting sensitive data leaks using application-level taint tracking}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {45}, number = {1}, pages = {142--154}, year = {2011}, url = {https://doi.org/10.1145/1945023.1945039}, doi = {10.1145/1945023.1945039}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/ZhuJSKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AtenieseBCHKKPS11, author = {Giuseppe Ateniese and Randal C. Burns and Reza Curtmola and Joseph Herring and Osama Khan and Lea Kissner and Zachary N. J. Peterson and Dawn Song}, title = {Remote data checking using provable data possession}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {12:1--12:34}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952994}, doi = {10.1145/1952982.1952994}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AtenieseBCHKKPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChanSS11, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, title = {Private and Continual Release of Statistics}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {26:1--26:24}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043626}, doi = {10.1145/2043621.2043626}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ChanSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/BabicRS11, author = {Domagoj Babic and Daniel Reynaud and Dawn Song}, editor = {Ganesh Gopalakrishnan and Shaz Qadeer}, title = {Malware Analysis with Tree Automata Inference}, booktitle = {Computer Aided Verification - 23rd International Conference, {CAV} 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6806}, pages = {116--131}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22110-1\_10}, doi = {10.1007/978-3-642-22110-1\_10}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/BabicRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SamuelSS11, author = {Mike Samuel and Prateek Saxena and Dawn Song}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Context-sensitive auto-sanitization in web templating languages using type qualifiers}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {587--600}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046775}, doi = {10.1145/2046707.2046775}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SamuelSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeltCHSW11, author = {Adrienne Porter Felt and Erika Chin and Steve Hanna and Dawn Song and David A. Wagner}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Android permissions demystified}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {627--638}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046779}, doi = {10.1145/2046707.2046779}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FeltCHSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WeinbergerSAFSS11, author = {Joel Weinberger and Prateek Saxena and Devdatta Akhawe and Matthew Finifter and Eui Chul Richard Shin and Dawn Song}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {A Systematic Analysis of {XSS} Sanitization in Web Application Frameworks}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {150--171}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_9}, doi = {10.1007/978-3-642-23822-2\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WeinbergerSAFSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/ManiatisAFSS11, author = {Petros Maniatis and Devdatta Akhawe and Kevin R. Fall and Elaine Shi and Dawn Song}, editor = {Matt Welsh}, title = {Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection}, booktitle = {13th Workshop on Hot Topics in Operating Systems, HotOS XIII, Napa, California, USA, May 9-11, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/hotosxiii/do-you-know-where-your-data-are-secure-data-capsules-deployable-data-protection}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/hotos/ManiatisAFSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ThomasGSP11, author = {Kurt Thomas and Chris Grier and Dawn Song and Vern Paxson}, editor = {Patrick Thiran and Walter Willinger}, title = {Suspended accounts in retrospect: an analysis of twitter spam}, booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '11, Berlin, Germany, November 2-, 2011}, pages = {243--258}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2068816.2068840}, doi = {10.1145/2068816.2068840}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/ThomasGSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/BabicMMS11, author = {Domagoj Babic and Lorenzo Martignoni and Stephen McCamant and Dawn Song}, editor = {Matthew B. Dwyer and Frank Tip}, title = {Statically-directed dynamic automated test generation}, booktitle = {Proceedings of the 20th International Symposium on Software Testing and Analysis, {ISSTA} 2011, Toronto, ON, Canada, July 17-21, 2011}, pages = {12--22}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2001420.2001423}, doi = {10.1145/2001420.2001423}, timestamp = {Tue, 29 Dec 2020 18:31:45 +0100}, biburl = {https://dblp.org/rec/conf/issta/BabicMMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KangMPS11, author = {Min Gyung Kang and Stephen McCamant and Pongsin Poosankam and Dawn Song}, title = {{DTA++:} Dynamic Taint Analysis with Targeted Control-Flow Propagation}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KangMPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShiCRCS11, author = {Elaine Shi and T.{-}H. Hubert Chan and Eleanor Gilbert Rieffel and Richard Chow and Dawn Song}, title = {Privacy-Preserving Aggregation of Time-Series Data}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/privacy-preserving-aggregation-of-time-series-data}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ShiCRCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/MashimaSSLCS11, author = {Daisuke Mashima and Prateek Sarkar and Elaine Shi and Chris Li and Richard Chow and Dawn Song}, title = {Privacy settings from contextual attributes: {A} case study using Google Buzz}, booktitle = {Ninth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2011, 21-25 March 2011, Seattle, WA, USA, Workshop Proceedings}, pages = {257--262}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PERCOMW.2011.5766879}, doi = {10.1109/PERCOMW.2011.5766879}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/MashimaSSLCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JohnsonCCMPRS11, author = {Noah M. Johnson and Juan Caballero and Kevin Zhijie Chen and Stephen McCamant and Pongsin Poosankam and Daniel Reynaud and Dawn Song}, title = {Differential Slicing: Identifying Causal Execution Differences for Security Applications}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {347--362}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.41}, doi = {10.1109/SP.2011.41}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/JohnsonCCMPRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ThomasGMPS11, author = {Kurt Thomas and Chris Grier and Justin Ma and Vern Paxson and Dawn Song}, title = {Design and Evaluation of a Real-Time {URL} Spam Filtering Service}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {447--462}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.25}, doi = {10.1109/SP.2011.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ThomasGMPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChoBPCWS11, author = {Chia Yuan Cho and Domagoj Babic and Pongsin Poosankam and Kevin Zhijie Chen and Edward XueJun Wu and Dawn Song}, title = {{MACE:} Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Cho.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChoBPCWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HannaRMPBFS11, author = {Steve Hanna and Rolf Rolles and Andres Molina{-}Markham and Pongsin Poosankam and Jeremiah Blocki and Kevin Fu and Dawn Song}, editor = {Ben Adida and Umesh Shankar}, title = {Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices}, booktitle = {2nd {USENIX} Workshop on Health Security and Privacy, HealthSec'11, San Francisco, CA, USA, August 9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/healthsec11/take-two-software-updates-and-see-me-morning-case-software-security}, timestamp = {Mon, 01 Feb 2021 17:03:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/HannaRMPBFS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WeinbergerBS11, author = {Joel Weinberger and Adam Barth and Dawn Song}, editor = {Patrick D. McDaniel}, title = {Towards Client-side {HTML} Security Policies}, booktitle = {6th {USENIX} Workshop on Hot Topics in Security, HotSec'11, San Francisco, CA, USA, August 9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/hotsec11/towards-client-side-html-security-policies}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/WeinbergerBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1106-3652, author = {Emil Stefanov and Elaine Shi and Dawn Song}, title = {Towards Practical Oblivious {RAM}}, journal = {CoRR}, volume = {abs/1106.3652}, year = {2011}, url = {http://arxiv.org/abs/1106.3652}, eprinttype = {arXiv}, eprint = {1106.3652}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-3652.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1109-0507, author = {Adam Barth and Saung Li and Benjamin I. P. Rubinstein and Dawn Song}, title = {How Open Should Open Source Be?}, journal = {CoRR}, volume = {abs/1109.0507}, year = {2011}, url = {http://arxiv.org/abs/1109.0507}, eprinttype = {arXiv}, eprint = {1109.0507}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1109-0507.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1112-3265, author = {Neil Zhenqiang Gong and Ameet Talwalkar and Lester W. Mackey and Ling Huang and Eui Chul Richard Shin and Emil Stefanov and Elaine Shi and Dawn Song}, title = {Predicting Links and Inferring Attributes using a Social-Attribute Network {(SAN)}}, journal = {CoRR}, volume = {abs/1112.3265}, year = {2011}, url = {http://arxiv.org/abs/1112.3265}, eprinttype = {arXiv}, eprint = {1112.3265}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1112-3265.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StefanovSS11, author = {Emil Stefanov and Elaine Shi and Dawn Song}, title = {Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2011}, url = {http://eprint.iacr.org/2011/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StefanovSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanSS11, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, title = {Privacy-Preserving Stream Aggregation with Fault Tolerance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {655}, year = {2011}, url = {http://eprint.iacr.org/2011/655}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaballeroPMBS10, author = {Juan Caballero and Pongsin Poosankam and Stephen McCamant and Domagoj Babic and Dawn Song}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Input generation via decomposition and re-stitching: finding bugs in Malware}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {413--425}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866354}, doi = {10.1145/1866307.1866354}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaballeroPMBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChocSS10, author = {Chia Yuan Cho and Domagoj Babic and Eui Chul Richard Shin and Dawn Song}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Inference and analysis of formal models of botnet command and control protocols}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {426--439}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866355}, doi = {10.1145/1866307.1866355}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChocSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AkhaweBLMS10, author = {Devdatta Akhawe and Adam Barth and Peifung E. Lam and John C. Mitchell and Dawn Song}, title = {Towards a Formal Foundation of Web Security}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {290--304}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.27}, doi = {10.1109/CSF.2010.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AkhaweBLMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/YinPHS10, author = {Heng Yin and Pongsin Poosankam and Steve Hanna and Dawn Xiaodong Song}, editor = {Christian Kreibich and Marko Jahnke}, title = {HookScout: Proactive Binary-Centric Hook Detection}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6201}, pages = {1--20}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14215-4\_1}, doi = {10.1007/978-3-642-14215-4\_1}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/YinPHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BarthRSMSB10, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Song and Peter L. Bartlett}, editor = {Radu Sion}, title = {A Learning-Based Approach to Reactive Security}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {192--206}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_16}, doi = {10.1007/978-3-642-14577-3\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BarthRSMSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BethencourtSS10, author = {John Bethencourt and Elaine Shi and Dawn Song}, editor = {Radu Sion}, title = {Signatures of Reputation}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {400--407}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_35}, doi = {10.1007/978-3-642-14577-3\_35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BethencourtSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/ChanSS10, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, editor = {Samson Abramsky and Cyril Gavoille and Claude Kirchner and Friedhelm Meyer auf der Heide and Paul G. Spirakis}, title = {Private and Continual Release of Statistics}, booktitle = {Automata, Languages and Programming, 37th International Colloquium, {ICALP} 2010, Bordeaux, France, July 6-10, 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6199}, pages = {405--417}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14162-1\_34}, doi = {10.1007/978-3-642-14162-1\_34}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/ChanSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/ChoCGPS10, author = {Chia Yuan Cho and Juan Caballero and Chris Grier and Vern Paxson and Dawn Song}, editor = {Michael D. Bailey}, title = {Insights from the Inside: {A} View of Botnet Management from Infiltration}, booktitle = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '10, San Jose, CA, USA, April 27, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/leet-10/insights-inside-view-botnet-management-infiltration}, timestamp = {Mon, 20 Nov 2023 09:09:49 +0100}, biburl = {https://dblp.org/rec/conf/leet/ChoCGPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CaballeroJMS10, author = {Juan Caballero and Noah M. Johnson and Stephen McCamant and Dawn Song}, title = {Binary Code Extraction and Interface Identification for Security Applications}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/binary-code-extraction-and-interface-identification-security-applications}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CaballeroJMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SaxenaHPS10, author = {Prateek Saxena and Steve Hanna and Pongsin Poosankam and Dawn Song}, title = {{FLAX:} Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/flax-systematic-discovery-client-side-validation-vulnerabilities-rich-web-applications}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SaxenaHPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SaxenaAHMMS10, author = {Prateek Saxena and Devdatta Akhawe and Steve Hanna and Feng Mao and Stephen McCamant and Dawn Song}, title = {A Symbolic Execution Framework for JavaScript}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {513--528}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.38}, doi = {10.1109/SP.2010.38}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/SaxenaAHMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10, author = {Paul Barford and Marc Dacier and Thomas G. Dietterich and Matt Fredrikson and Jonathon T. Giffin and Sushil Jajodia and Somesh Jha and Jason H. Li and Peng Liu and Peng Ning and Xinming Ou and Dawn Song and Laura Strater and Vipin Swarup and George P. Tadda and C. Wang and John Yen}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Cyber {SA:} Situational Awareness for Cyber Defense}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {3--13}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_1}, doi = {10.1007/978-1-4419-0140-8\_1}, timestamp = {Wed, 25 Sep 2019 17:41:05 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanSS10, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, title = {Private and Continual Release of Statistics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2010}, url = {http://eprint.iacr.org/2010/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoRS09, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, title = {Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {6}, number = {2}, pages = {96--110}, year = {2009}, url = {https://doi.org/10.1109/TDSC.2008.39}, doi = {10.1109/TDSC.2008.39}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GaoRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BethencourtSW09, author = {John Bethencourt and Dawn Xiaodong Song and Brent Waters}, title = {New Techniques for Private Stream Searching}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {16:1--16:32}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455529}, doi = {10.1145/1455526.1455529}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BethencourtSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KangYHMS09, author = {Min Gyung Kang and Heng Yin and Steve Hanna and Stephen McCamant and Dawn Song}, editor = {Angelos Stavrou}, title = {Emulating emulation-resistant malware}, booktitle = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security, VMSec '09, Chicago, Illinois, USA, November 9, 2009}, pages = {11--22}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655148.1655151}, doi = {10.1145/1655148.1655151}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KangYHMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaballeroPKS09, author = {Juan Caballero and Pongsin Poosankam and Christian Kreibich and Dawn Xiaodong Song}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {621--634}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653737}, doi = {10.1145/1653662.1653737}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaballeroPKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/SaxenaPMS09, author = {Prateek Saxena and Pongsin Poosankam and Stephen McCamant and Dawn Song}, editor = {Gregg Rothermel and Laura K. Dillon}, title = {Loop-extended symbolic execution on binary programs}, booktitle = {Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, {ISSTA} 2009, Chicago, IL, USA, July 19-23, 2009}, pages = {225--236}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572272.1572299}, doi = {10.1145/1572272.1572299}, timestamp = {Tue, 06 Nov 2018 16:57:30 +0100}, biburl = {https://dblp.org/rec/conf/issta/SaxenaPMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NadjiSS09, author = {Yacin Nadji and Prateek Saxena and Dawn Song}, title = {Document Structure Integrity: {A} Robust Basis for Cross-site Scripting Defense}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/document-structure-integrity-a-robust-basis-for-cross-site-scripting-defense/}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NadjiSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/VenkataramanBSSS09, author = {Shobha Venkataraman and Avrim Blum and Dawn Song and Subhabrata Sen and Oliver Spatscheck}, editor = {Yoshua Bengio and Dale Schuurmans and John D. Lafferty and Christopher K. I. Williams and Aron Culotta}, title = {Tracking Dynamic Sources of Malicious Activity at Internet Scale}, booktitle = {Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, Vancouver, British Columbia, Canada}, pages = {1946--1954}, publisher = {Curran Associates, Inc.}, year = {2009}, url = {https://proceedings.neurips.cc/paper/2009/hash/b6edc1cd1f36e45daf6d7824d7bb2283-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/VenkataramanBSSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/NewsomeMS09, author = {James Newsome and Stephen McCamant and Dawn Song}, editor = {Stephen Chong and David A. Naumann}, title = {Measuring channel capacity to distinguish undue influence}, booktitle = {Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, {PLAS} 2009, Dublin, Ireland, 15-21 June, 2009}, pages = {73--85}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1554339.1554349}, doi = {10.1145/1554339.1554349}, timestamp = {Fri, 25 Jun 2021 14:48:54 +0200}, biburl = {https://dblp.org/rec/conf/pldi/NewsomeMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaballeroLPS09, author = {Juan Caballero and Zhenkai Liang and Pongsin Poosankam and Dawn Song}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {161--181}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_9}, doi = {10.1007/978-3-642-04342-0\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/CaballeroLPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BarthCS09, author = {Adam Barth and Juan Caballero and Dawn Song}, title = {Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {360--371}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.3}, doi = {10.1109/SP.2009.3}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/BarthCS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BarthWS09, author = {Adam Barth and Joel Weinberger and Dawn Song}, editor = {Fabian Monrose}, title = {Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {187--198}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/barth.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BarthWS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2009ccsw, editor = {Radu Sion and Dawn Song}, title = {Proceedings of the first {ACM} Cloud Computing Security Workshop, {CCSW} 2009, Chicago, IL, USA, November 13, 2009}, publisher = {{ACM}}, year = {2009}, url = {http://dl.acm.org/citation.cfm?id=1655008}, isbn = {978-1-60558-784-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2009ccsw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-1155, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Xiaodong Song and Peter L. Bartlett}, title = {A Learning-Based Approach to Reactive Security}, journal = {CoRR}, volume = {abs/0912.1155}, year = {2009}, url = {http://arxiv.org/abs/0912.1155}, eprinttype = {arXiv}, eprint = {0912.1155}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-1155.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BrumleyNSWJ08, author = {David Brumley and James Newsome and Dawn Song and Hao Wang and Somesh Jha}, title = {Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {224--241}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2008.55}, doi = {10.1109/TDSC.2008.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GaoRS08, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {BinHunt: Automatically Finding Semantic Differences in Binary Programs}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {238--255}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_16}, doi = {10.1007/978-3-540-88625-9\_16}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/GaoRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SongBYCJKLNPS08, author = {Dawn Xiaodong Song and David Brumley and Heng Yin and Juan Caballero and Ivan Jager and Min Gyung Kang and Zhenkai Liang and James Newsome and Pongsin Poosankam and Prateek Saxena}, editor = {R. Sekar and Arun K. Pujari}, title = {BitBlaze: {A} New Approach to Computer Security via Binary Analysis}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {1--25}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_1}, doi = {10.1007/978-3-540-89862-7\_1}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SongBYCJKLNPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BethencourtSW08, author = {John Bethencourt and Dawn Song and Brent Waters}, title = {Analysis-Resistant Malware}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/analysis-resistant-malware/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BethencourtSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CaballeroKSW08, author = {Juan Caballero and Theocharis Kampouris and Dawn Song and Jia Wang}, title = {Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/would-diversity-really-increase-robustness-routing-infrastructure-against-software-defects/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CaballeroKSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VenkataramanBS08, author = {Shobha Venkataraman and Avrim Blum and Dawn Song}, title = {Limits of Learning-based Signature Generation with Adversaries}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/limits-of-learning-based-signature-generation-with-adversaries/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VenkataramanBS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/YinLS08, author = {Heng Yin and Zhenkai Liang and Dawn Song}, title = {HookFinder: Identifying and Understanding Malware Hooking Behaviors}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/hookfinder-identifying-and-understanding-malware-hooking-behaviors/}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/YinLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BrumleyPSZ08, author = {David Brumley and Pongsin Poosankam and Dawn Xiaodong Song and Jiang Zheng}, title = {Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {143--157}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.17}, doi = {10.1109/SP.2008.17}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/BrumleyPSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BrumleyHLNSY08, author = {David Brumley and Cody Hartwig and Zhenkai Liang and James Newsome and Dawn Xiaodong Song and Heng Yin}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Automatically Identifying Trigger-based Behavior in Malware}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {65--88}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_4}, doi = {10.1007/978-0-387-68768-1\_4}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/BrumleyHLNSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChanPPS07, author = {Haowen Chan and Adrian Perrig and Bartosz Przydatek and Dawn Xiaodong Song}, title = {{SIA:} Secure information aggregation in sensor networks}, journal = {J. Comput. Secur.}, volume = {15}, number = {1}, pages = {69--102}, year = {2007}, url = {https://doi.org/10.3233/jcs-2007-15104}, doi = {10.3233/JCS-2007-15104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChanPPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YinSEKK07, author = {Heng Yin and Dawn Xiaodong Song and Manuel Egele and Christopher Kruegel and Engin Kirda}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Panorama: capturing system-wide information flow for malware detection and analysis}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {116--127}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315261}, doi = {10.1145/1315245.1315261}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YinSEKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaballeroYLS07, author = {Juan Caballero and Heng Yin and Zhenkai Liang and Dawn Xiaodong Song}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Polyglot: automatic extraction of protocol message format using dynamic binary analysis}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {317--329}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315286}, doi = {10.1145/1315245.1315286}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaballeroYLS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseBCHKPS07, author = {Giuseppe Ateniese and Randal C. Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary N. J. Peterson and Dawn Xiaodong Song}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Provable data possession at untrusted stores}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {598--609}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315318}, doi = {10.1145/1315245.1315318}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseBCHKPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BrumleyWJS07, author = {David Brumley and Hao Wang and Somesh Jha and Dawn Xiaodong Song}, title = {Creating Vulnerability Signatures Using Weakest Preconditions}, booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8 July 2007, Venice, Italy}, pages = {311--325}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSF.2007.17}, doi = {10.1109/CSF.2007.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BrumleyWJS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KangCS07, author = {Min Gyung Kang and Juan Caballero and Dawn Xiaodong Song}, editor = {Bernhard M. H{\"{a}}mmerli and Robin Sommer}, title = {Distributed Evasive Scan Techniques and Countermeasures}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, {DIMVA} 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4579}, pages = {157--174}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73614-1\_10}, doi = {10.1007/978-3-540-73614-1\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/KangCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/TucekNLHXBZS07, author = {Joseph A. Tucek and James Newsome and Shan Lu and Chengdu Huang and Spiros Xanthos and David Brumley and Yuanyuan Zhou and Dawn Xiaodong Song}, editor = {Paulo Ferreira and Thomas R. Gross and Lu{\'{\i}}s Veiga}, title = {Sweeper: a lightweight end-to-end system for defending against fast worms}, booktitle = {Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007}, pages = {115--128}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1272996.1273010}, doi = {10.1145/1272996.1273010}, timestamp = {Thu, 12 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/TucekNLHXBZS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/GaoZSVCSK07, author = {Yan Gao and Yao Zhao and Robert T. Schweller and Shobha Venkataraman and Yan Chen and Dawn Xiaodong Song and Ming{-}Yang Kao}, title = {Detecting Stealthy Spreaders Using Online Outdegree Histograms}, booktitle = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS 2007, Evanston, Illinois, USA, June 21-22, 2007}, pages = {145--153}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/IWQOS.2007.376561}, doi = {10.1109/IWQOS.2007.376561}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/GaoZSVCSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BrumleySCJL07, author = {David Brumley and Dawn Xiaodong Song and Tzi{-}cker Chiueh and Rob Johnson and Huijia Lin}, title = {{RICH:} Automatically Protecting Against Integer-Based Vulnerabilities}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March 2007}, publisher = {The Internet Society}, year = {2007}, url = {https://www.ndss-symposium.org/ndss2007/rich-automatically-protecting-against-integer-based-vulnerabilities/}, timestamp = {Mon, 01 Feb 2021 08:42:16 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BrumleySCJL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VenkataramanCPKS07, author = {Shobha Venkataraman and Juan Caballero and Pongsin Poosankam and Min Gyung Kang and Dawn Xiaodong Song}, title = {Fig: Automatic Fingerprint Generation}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March 2007}, publisher = {The Internet Society}, year = {2007}, url = {https://www.ndss-symposium.org/ndss2007/fig-automatic-fingerprint-generation/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VenkataramanCPKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShiBCSP07, author = {Elaine Shi and John Bethencourt and T.{-}H. Hubert Chan and Dawn Xiaodong Song and Adrian Perrig}, title = {Multi-Dimensional Range Query over Encrypted Data}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {350--364}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.29}, doi = {10.1109/SP.2007.29}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/ShiBCSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/EgeleKKYS07, author = {Manuel Egele and Christopher Kruegel and Engin Kirda and Heng Yin and Dawn Xiaodong Song}, editor = {Jeff Chase and Srinivasan Seshan}, title = {Dynamic Spyware Analysis}, booktitle = {Proceedings of the 2007 {USENIX} Annual Technical Conference, Santa Clara, CA, USA, June 17-22, 2007}, pages = {233--246}, publisher = {{USENIX}}, year = {2007}, url = {http://www.usenix.org/events/usenix07/tech/egele.html}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/usenix/EgeleKKYS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VenkataramanSSHS07, author = {Shobha Venkataraman and Subhabrata Sen and Oliver Spatscheck and Patrick Haffner and Dawn Song}, editor = {Niels Provos}, title = {Exploiting Network Structure for Proactive Spam Mitigation}, booktitle = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA, August 6-10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/16th-usenix-security-symposium/exploiting-network-structure-proactive-spam-mitigation}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/VenkataramanSSHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BrumleyNS07, author = {David Brumley and James Newsome and Dawn Song}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Sting: An End-to-End Self-Healing System for Defending against Internet Worms}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {147--170}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_7}, doi = {10.1007/978-0-387-44599-1\_7}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/BrumleyNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/27, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1}, doi = {10.1007/978-0-387-44599-1}, isbn = {978-0-387-32720-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/27.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseBCHKPS07, author = {Giuseppe Ateniese and Randal C. Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary N. J. Peterson and Dawn Song}, title = {Provable Data Possession at Untrusted Stores}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2007}, url = {http://eprint.iacr.org/2007/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseBCHKPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/YaarPS06, author = {Abraham Yaar and Adrian Perrig and Dawn Song}, title = {StackPi: New Packet Marking and Filtering Mechanisms for DDoS and {IP} Spoofing Defense}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {24}, number = {10}, pages = {1853--1863}, year = {2006}, url = {https://doi.org/10.1109/JSAC.2006.877138}, doi = {10.1109/JSAC.2006.877138}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/YaarPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrumleyLPS06, author = {David Brumley and Li{-}Hao Liu and Pongsin Poosankam and Dawn Xiaodong Song}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Design space and analysis of worm defense strategies}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {125--137}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128837}, doi = {10.1145/1128817.1128837}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrumleyLPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChanPS06, author = {Haowen Chan and Adrian Perrig and Dawn Xiaodong Song}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Secure hierarchical in-network aggregation in sensor networks}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {278--287}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180440}, doi = {10.1145/1180405.1180440}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChanPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NewsomeBFS06, author = {James Newsome and David Brumley and Jason Franklin and Dawn Xiaodong Song}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Replayer: automatic protocol replay by binary analysis}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {311--321}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180444}, doi = {10.1145/1180405.1180444}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NewsomeBFS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/VenkataramanCSB06, author = {Shobha Venkataraman and Juan Caballero and Dawn Song and Avrim Blum and Jennifer Yates}, editor = {Eddie Kohler and Greg Minshall}, title = {Black Box Anomaly Detection: Is It Utopian?}, booktitle = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine, California, USA, November 29-30, 2006}, publisher = {{ACM} {SIGCOMM}}, year = {2006}, url = {http://conferences.sigcomm.org/hotnets/2006/venkataraman06black.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotnets/VenkataramanCSB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NewsomeBSCK06, author = {James Newsome and David Brumley and Dawn Xiaodong Song}, title = {Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2006, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2006}, url = {https://www.ndss-symposium.org/ndss2006/vulnerability-specific-execution-filtering-exploit-prevention-commodity-software/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NewsomeBSCK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GaoRS06, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Behavioral Distance Measurement Using Hidden Markov Models}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {19--40}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_2}, doi = {10.1007/11856214\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GaoRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NewsomeKS06, author = {James Newsome and Brad Karp and Dawn Xiaodong Song}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Paragraph: Thwarting Signature Learning by Training Maliciously}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {81--105}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_5}, doi = {10.1007/11856214\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NewsomeKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06, author = {David Brumley and James Newsome and Dawn Xiaodong Song and Hao Wang and Somesh Jha}, title = {Towards Automatic Generation of Vulnerability-Based Signatures}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {2--16}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.41}, doi = {10.1109/SP.2006.41}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BrumleyNSWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BethencourtSW06, author = {John Bethencourt and Dawn Xiaodong Song and Brent Waters}, title = {New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {132--139}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.27}, doi = {10.1109/SP.2006.27}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BethencourtSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BrumleyS06, author = {David Brumley and Dawn Song}, title = {Towards Attack-Agnostic Defenses}, booktitle = {1st {USENIX} Workshop on Hot Topics in Security, HotSec'06, Vancouver, BC, Canada, July 31, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/hotsec-06/towards-attack-agnostic-defenses}, timestamp = {Mon, 01 Feb 2021 08:43:09 +0100}, biburl = {https://dblp.org/rec/conf/uss/BrumleyS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KissnerS05, author = {Lea Kissner and Dawn Xiaodong Song}, editor = {Victor Shoup}, title = {Privacy-Preserving Set Operations}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {241--257}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_15}, doi = {10.1007/11535218\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KissnerS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/YaarPS05, author = {Abraham Yaar and Adrian Perrig and Dawn Xiaodong Song}, title = {{FIT:} fast Internet traceback}, booktitle = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer and Communications Societies, 13-17 March 2005, Miami, FL, {USA}}, pages = {1395--1406}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/INFCOM.2005.1498364}, doi = {10.1109/INFCOM.2005.1498364}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/YaarPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwap/XueSZF05, author = {Rui Xue and Dawn Song and Zhenfeng Zhang and Dengguo Feng}, editor = {Jianying Zhou and Meng{-}Chow Kang and Feng Bao and HweeHwa Pang}, title = {A Generic Scheme for Zero-Knowledge Sets}, booktitle = {Applied Public Key Infrastructure - 4th International Workshop: {IWAP} 2005, Singapore, September 21-23, 2005}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {128}, pages = {249--263}, publisher = {{IOS} Press}, year = {2005}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1247}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwap/XueSZF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NewsomeS05, author = {James Newsome and Dawn Xiaodong Song}, title = {Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2005, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2005}, url = {https://www.ndss-symposium.org/ndss2005/dynamic-taint-analysis-automatic-detection-analysis-and-signaturegeneration-exploits-commodity/}, timestamp = {Mon, 01 Feb 2021 08:42:12 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NewsomeS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VenkataramanSGB05, author = {Shobha Venkataraman and Dawn Xiaodong Song and Phillip B. Gibbons and Avrim Blum}, title = {New Streaming Algorithms for Fast Detection of Superspreaders}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2005, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2005}, url = {https://www.ndss-symposium.org/ndss2005/new-streaming-algorithms-fast-detection-superspreaders/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VenkataramanSGB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GaoRS05, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Behavioral Distance for Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {63--81}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_4}, doi = {10.1007/11663812\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GaoRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChristodorescuJSSB05, author = {Mihai Christodorescu and Somesh Jha and Sanjit A. Seshia and Dawn Xiaodong Song and Randal E. Bryant}, title = {Semantics-Aware Malware Detection}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {32--46}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.20}, doi = {10.1109/SP.2005.20}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChristodorescuJSSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NewsomeKS05, author = {James Newsome and Brad Karp and Dawn Xiaodong Song}, title = {Polygraph: Automatically Generating Signatures for Polymorphic Worms}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {226--241}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.15}, doi = {10.1109/SP.2005.15}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/NewsomeKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4082, author = {Adrian Perrig and Dawn Song and Ran Canetti and J. D. Tygar and Bob Briscoe}, title = {Timed Efficient Stream Loss-Tolerant Authentication {(TESLA):} Multicast Source Authentication Transform Introduction}, journal = {{RFC}}, volume = {4082}, pages = {1--22}, year = {2005}, url = {https://doi.org/10.17487/RFC4082}, doi = {10.17487/RFC4082}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4082.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KissnerORSY04, author = {Lea Kissner and Alina Oprea and Michael K. Reiter and Dawn Xiaodong Song and Ke Yang}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Private Keyword-Based Push and Pull with Applications to Anonymous Communication}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {16--30}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_2}, doi = {10.1007/978-3-540-24852-1\_2}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/KissnerORSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoRS04, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Gray-box extraction of execution graphs for anomaly detection}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {318--329}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030126}, doi = {10.1145/1030083.1030126}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaoRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/WongWSBG04, author = {Cynthia Wong and Chenxi Wang and Dawn Xiaodong Song and Stan Bielski and Gregory R. Ganger}, title = {Dynamic Quarantine of Internet Worms}, booktitle = {2004 International Conference on Dependable Systems and Networks {(DSN} 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings}, pages = {73--82}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/DSN.2004.1311878}, doi = {10.1109/DSN.2004.1311878}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WongWSBG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipsn/NewsomeSSP04, author = {James Newsome and Elaine Shi and Dawn Xiaodong Song and Adrian Perrig}, editor = {Kannan Ramchandran and Janos Sztipanovits and Jennifer C. Hou and Thrasyvoulos N. Pappas}, title = {The sybil attack in sensor networks: analysis {\&} defenses}, booktitle = {Proceedings of the Third International Symposium on Information Processing in Sensor Networks, {IPSN} 2004, Berkeley, California, USA, April 26-27, 2004}, pages = {259--268}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/984622.984660}, doi = {10.1145/984622.984660}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ipsn/NewsomeSSP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BlumSV04, author = {Avrim Blum and Dawn Xiaodong Song and Shobha Venkataraman}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {258--277}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_14}, doi = {10.1007/978-3-540-30143-1\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BlumSV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YaarPS04, author = {Abraham Yaar and Adrian Perrig and Dawn Xiaodong Song}, title = {{SIFF:} {A} Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {130}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301320}, doi = {10.1109/SECPRI.2004.1301320}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/YaarPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BrumleyS04, author = {David Brumley and Dawn Xiaodong Song}, editor = {Matt Blaze}, title = {Privtrans: Automatically Partitioning Programs for Privilege Separation}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {57--72}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/brumley.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BrumleyS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GaoRS04, author = {Debin Gao and Michael K. Reiter and Dawn Xiaodong Song}, editor = {Matt Blaze}, title = {On Gray-Box Program Tracking for Anomaly Detection}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, pages = {103--118}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/gao.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GaoRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/NewsomeS03, author = {James Newsome and Dawn Xiaodong Song}, editor = {Ian F. Akyildiz and Deborah Estrin and David E. Culler and Mani B. Srivastava}, title = {{GEM:} graph eMbedding for routing and data-centric storage in sensor networks without geographic information}, booktitle = {Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys 2003, Los Angeles, California, USA, November 5-7, 2003}, pages = {76--88}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/958491.958501}, doi = {10.1145/958491.958501}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sensys/NewsomeS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/PrzydatekSP03, author = {Bartosz Przydatek and Dawn Xiaodong Song and Adrian Perrig}, editor = {Ian F. Akyildiz and Deborah Estrin and David E. Culler and Mani B. Srivastava}, title = {{SIA:} secure information aggregation in sensor networks}, booktitle = {Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys 2003, Los Angeles, California, USA, November 5-7, 2003}, pages = {255--265}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/958491.958521}, doi = {10.1145/958491.958521}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sensys/PrzydatekSP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YaarPS03, author = {Abraham Yaar and Adrian Perrig and Dawn Xiaodong Song}, title = {Pi: {A} Path Identification Mechanism to Defend against DDoS Attack}, booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, pages = {93}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199330}, doi = {10.1109/SECPRI.2003.1199330}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/YaarPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChanPS03, author = {Haowen Chan and Adrian Perrig and Dawn Xiaodong Song}, title = {Random Key Predistribution Schemes for Sensor Networks}, booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, pages = {197}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199337}, doi = {10.1109/SECPRI.2003.1199337}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChanPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JohnsonMSW02, author = {Robert Johnson and David Molnar and Dawn Xiaodong Song and David A. Wagner}, editor = {Bart Preneel}, title = {Homomorphic Signature Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {244--262}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_17}, doi = {10.1007/3-540-45760-7\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JohnsonMSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AtenieseST02, author = {Giuseppe Ateniese and Dawn Xiaodong Song and Gene Tsudik}, editor = {Matt Blaze}, title = {Quasi-Efficient Revocation in Group Signatures}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {183--197}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_14}, doi = {10.1007/3-540-36504-4\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AtenieseST02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SongTZ02, author = {Dawn Xiaodong Song and J. D. Tygar and David Zuckerman}, title = {Expander Graphs for Digital Stream Authentication and Robust Overlay Networks}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {258--270}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004376}, doi = {10.1109/SECPRI.2002.1004376}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/SongTZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SongBP01, author = {Dawn Xiaodong Song and Sergey Berezin and Adrian Perrig}, title = {Athena: {A} Novel Approach to Efficient Automatic Security Protocol Analysis}, journal = {J. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {47--74}, year = {2001}, url = {https://doi.org/10.3233/jcs-2001-91-203}, doi = {10.3233/JCS-2001-91-203}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SongBP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/SongPP01, author = {Dawn Xiaodong Song and Adrian Perrig and Doantam Phan}, editor = {G{\'{e}}rard Berry and Hubert Comon and Alain Finkel}, title = {{AGVI} - Automatic Generation, Verification, and Implementation of Security Protocols}, booktitle = {Computer Aided Verification, 13th International Conference, {CAV} 2001, Paris, France, July 18-22, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2102}, pages = {241--245}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44585-4\_21}, doi = {10.1007/3-540-44585-4\_21}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/SongPP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CrosbyGJSW01, author = {Scott A. Crosby and Ian Goldberg and Robert Johnson and Dawn Xiaodong Song and David A. Wagner}, editor = {Tomas Sander}, title = {A Cryptanalysis of the High-Bandwidth Digital Content Protection System}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {192--200}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_12}, doi = {10.1007/3-540-47870-1\_12}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CrosbyGJSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Song01, author = {Dawn Xiaodong Song}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Practical forward secure group signature schemes}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {225--234}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502015}, doi = {10.1145/501983.502015}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Song01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SongP01, author = {Dawn Xiaodong Song and Adrian Perrig}, title = {Advanced and Authenticated Marking Schemes for {IP} Traceback}, booktitle = {Proceedings {IEEE} {INFOCOM} 2001, The Conference on Computer Communications, Twentieth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Twenty years into the communications odyssey, Anchorage, Alaska, USA, April 22-26, 2001}, pages = {878--886}, publisher = {{IEEE} Comptuer Society}, year = {2001}, url = {https://doi.org/10.1109/INFCOM.2001.916279}, doi = {10.1109/INFCOM.2001.916279}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/SongP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/PerrigSST01, author = {Adrian Perrig and Sean W. Smith and Dawn Xiaodong Song and J. D. Tygar}, title = {{SAM:} {A} Flexible and Secure Auction Architecture Using Trusted Hardware}, booktitle = {Proceedings of the 15th International Parallel {\&} Distributed Processing Symposium (IPDPS-01), San Francisco, CA, USA, April 23-27, 2001}, pages = {170}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/IPDPS.2001.925165}, doi = {10.1109/IPDPS.2001.925165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/PerrigSST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PerrigCST01, author = {Adrian Perrig and Ran Canetti and Dawn Xiaodong Song and J. D. Tygar}, title = {Efficient and Secure Source Authentication for Multicast}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2001, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2001}, url = {https://www.ndss-symposium.org/ndss2001/efficient-and-secure-source-authentication-multicast/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PerrigCST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PerrigST01, author = {Adrian Perrig and Dawn Xiaodong Song and J. D. Tygar}, title = {ELK, {A} New Protocol for Efficient Large-Group Key Distribution}, booktitle = {2001 {IEEE} Symposium on Security and Privacy, Oakland, California, {USA} May 14-16, 2001}, pages = {247--262}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SECPRI.2001.924302}, doi = {10.1109/SECPRI.2001.924302}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/PerrigST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SongWT01, author = {Dawn Xiaodong Song and David A. Wagner and Xuqing Tian}, editor = {Dan S. Wallach}, title = {Timing Analysis of Keystrokes and Timing Attacks on {SSH}}, booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington, D.C., {USA}}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/publications/library/proceedings/sec01/song.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SongWT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseST01, author = {Giuseppe Ateniese and Dawn Song and Gene Tsudik}, title = {Quasi-Efficient Revocation of Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2001}, url = {http://eprint.iacr.org/2001/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PerrigS00, author = {Adrian Perrig and Dawn Song}, title = {Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols}, booktitle = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, pages = {64--76}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CSFW.2000.856926}, doi = {10.1109/CSFW.2000.856926}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/PerrigS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PerrigS00, author = {Adrian Perrig and Dawn Xiaodong Song}, title = {A First Step Towards the Automatic Generation of Security Protocols}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2000, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2000}, url = {https://www.ndss-symposium.org/ndss2000/first-step-towards-automatic-generation-security-protocols-paper/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PerrigS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SongWP00, author = {Dawn Xiaodong Song and David A. Wagner and Adrian Perrig}, title = {Practical Techniques for Searches on Encrypted Data}, booktitle = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000}, pages = {44--55}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SECPRI.2000.848445}, doi = {10.1109/SECPRI.2000.848445}, timestamp = {Thu, 21 Sep 2023 15:57:29 +0200}, biburl = {https://dblp.org/rec/conf/sp/SongWP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PerrigCTS00, author = {Adrian Perrig and Ran Canetti and J. D. Tygar and Dawn Xiaodong Song}, title = {Efficient Authentication and Signing of Multicast Streams over Lossy Channels}, booktitle = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000}, pages = {56--73}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SECPRI.2000.848446}, doi = {10.1109/SECPRI.2000.848446}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/PerrigCTS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Song99, author = {Dawn Xiaodong Song}, title = {Athena: {A} New Efficient Automatic Checker for Security Protocol Analysis}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {192--202}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779773}, doi = {10.1109/CSFW.1999.779773}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Song99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.