Follow
Patrick McDaniel
Patrick McDaniel
William L. Weiss Professor, Computer Science and Engineering, Penn State Unviersity
Verified email at cse.psu.edu - Homepage
Title
Cited by
Cited by
Year
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
W Enck, P Gilbert, S Han, V Tendulkar, BG Chun, LP Cox, J Jung, ...
ACM Transactions on Computer Systems (TOCS) 32 (2), 1-29, 2014
45922014
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
35282016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
29052017
Distillation as a defense to adversarial perturbations against deep neural networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
2016 IEEE symposium on security and privacy (SP), 582-597, 2016
27562016
Ensemble adversarial training: Attacks and defenses
F Tramèr, A Kurakin, N Papernot, I Goodfellow, D Boneh, P McDaniel
arXiv preprint arXiv:1705.07204, 2017
22542017
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps
S Arzt, S Rasthofer, C Fritz, E Bodden, A Bartel, J Klein, Y Le Traon, ...
Acm Sigplan Notices 49 (6), 259-269, 2014
22452014
Transferability in machine learning: from phenomena to black-box attacks using adversarial samples
N Papernot, P McDaniel, I Goodfellow
arXiv preprint arXiv:1605.07277, 2016
14662016
Security and privacy challenges in the smart grid
P McDaniel, S McLaughlin
IEEE security & privacy 7 (3), 75-77, 2009
14322009
On lightweight mobile phone application certification
W Enck, M Ongtang, P McDaniel
Proceedings of the 16th ACM conference on Computer and communications …, 2009
13962009
A study of android application security.
W Enck, D Octeau, PD McDaniel, S Chaudhuri
USENIX security symposium 2 (2), 2011
13212011
Understanding android security
W Enck, M Ongtang, P McDaniel
IEEE security & privacy 7 (1), 50-57, 2009
9552009
Secure attribute-based systems
M Pirretti, P Traynor, P McDaniel, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
7712006
Semantically rich application‐centric security in Android
M Ongtang, S McLaughlin, W Enck, P McDaniel
Security and Communication Networks 5 (6), 658-673, 2012
7602012
Iccta: Detecting inter-component privacy leaks in android apps
L Li, A Bartel, TF Bissyandé, J Klein, Y Le Traon, S Arzt, S Rasthofer, ...
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
6702015
On the (statistical) detection of adversarial examples
K Grosse, P Manoharan, N Papernot, M Backes, P McDaniel
arXiv preprint arXiv:1702.06280, 2017
6412017
Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis
D Octeau, P McDaniel, S Jha, A Bartel, E Bodden, J Klein, Y Le Traon
Effective Inter-Component Communication Mapping in Android with Epicc: An …, 2013
5412013
Adversarial examples for malware detection
K Grosse, N Papernot, P Manoharan, M Backes, P McDaniel
European symposium on research in computer security, 62-79, 2017
5152017
Towards the science of security and privacy in machine learning
N Papernot, P McDaniel, A Sinha, M Wellman
arXiv preprint arXiv:1611.03814, 2016
4912016
An analysis of anonymity in bitcoin using p2p network traffic
P Koshy, D Koshy, P McDaniel
International Conference on Financial Cryptography and Data Security, 469-485, 2014
4812014
The space of transferable adversarial examples
F Tramèr, N Papernot, I Goodfellow, D Boneh, P McDaniel
arXiv preprint arXiv:1704.03453, 2017
4782017
The system can't perform the operation now. Try again later.
Articles 1–20