David Wagner

Results: 270



#Item
1Artificial neural networks / Applied mathematics / Cybernetics / Mathematics / Deep learning / CIFAR-10 / MNIST database / Rectifier / Softmax function / Feedforward neural network / Gradient descent / Activation function

Towards Evaluating the Robustness of Neural Networks Nicholas Carlini David Wagner University of California, Berkeley A BSTRACT

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:30
2Cryptography / Computing / Computer security / Cybercrime / Password / Security / Challengeresponse authentication / Secure Shell / Passphrase / Telnet / Computer keyboard / Typing

Timing Analysis of Keystrokes and Timing Attacks on SSH Dawn Xiaodong Song David Wagner University of California, Berkeley Xuqing Tian

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
3

Private Circuits II: Keeping Secrets in Tamperable Circuits Yuval Ishai? , Manoj Prabhakaran?? , Amit Sahai? ? ? , and David Wagner† Abstract. Motivated by the problem of protecting cryptographic hardware, we continue

Add to Reading List

Source URL: mmp.cs.illinois.edu

Language: English - Date: 2006-06-26 09:12:10
    4

    Proceedings on Privacy Enhancing Technologies ; ):87–106 Linda Lee*, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, and David Wagner A Usability Evaluation of Tor Launcher Abstract: Although Tor has

    Add to Reading List

    Source URL: petsymposium.org

    Language: English - Date: 2017-10-04 16:18:51
      5

      Diesel: Applying Privilege Separation to Database Access Adrienne Porter Felt, Matthew Finifter, Joel Weinberger, and David Wagner {apf, finifter, jww, daw}@cs.berkeley.edu UC Berkeley

      Add to Reading List

      Source URL: mfinifter.github.io

      Language: English - Date: 2016-04-20 20:43:40
        6

        The Rebound Effect and Energy Efficiency Policy Kenneth Gillingham *, David Rapson †, and Gernot Wagner ‡ September 25, 2015 Forthcoming, Review of Environmental Economics and Policy Abstract What do we know about th

        Add to Reading List

        Source URL: rapson.ucdavis.edu

        Language: English - Date: 2017-07-13 23:34:46
          7

          A Survey of Mobile Malware in the Wild Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, and David Wagner University of California, Berkeley

          Add to Reading List

          Source URL: mfinifter.github.io

          Language: English - Date: 2016-04-20 20:43:40
            8

            A User Study Design for Comparing the Security of Registration Protocols Chris Karlof J.D. Tygar David Wagner {ckarlof, tygar, daw}@cs.berkeley.edu University of California, Berkeley

            Add to Reading List

            Source URL: www.chriskarlof.com

            Language: English - Date: 2012-01-02 15:40:13
              9

              Hidden Voice Commands Nicholas Carlini and Pratyush Mishra, University of California, Berkeley; Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields, Georgetown University; David Wagner, University of California,

              Add to Reading List

              Source URL: security.cs.georgetown.edu

              Language: English - Date: 2016-08-10 17:31:34
                10

                C++ Dynamic Cast in Autonomous Space Systems Damian Dechev 1 , Rabi Mahapatra 1 , Bjarne Stroustrup 1 , David Wagner 2 , , , Texas A&M University 1

                Add to Reading List

                Source URL: www.stroustrup.com

                Language: English - Date: 2012-10-03 14:24:47
                  UPDATE