D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 90 Citations 62,542 253 World Ranking 352 National Ranking 210

Research.com Recognitions

Awards & Achievements

2003 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer security
  • Cryptography

His scientific interests lie mostly in Computer security, Cryptography, Computer network, Encryption and Wireless sensor network. His Computer security research incorporates themes from Android and Protocol. His study in Cryptography is interdisciplinary in nature, drawing from both Secrecy and Cipher.

His Static routing study, which is part of a larger body of work in Computer network, is frequently linked to Mimicry, bridging the gap between disciplines. David Wagner has researched Wireless sensor network in several fields, including Key distribution in wireless sensor networks, Optimized Link State Routing Protocol and Zone Routing Protocol. His work deals with themes such as Ciphertext and Server, which intersect with Block cipher.

His most cited work include:

  • Towards Evaluating the Robustness of Neural Networks (3170 citations)
  • Secure routing in wireless sensor networks: attacks and countermeasures (2764 citations)
  • Practical techniques for searches on encrypted data (2323 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Cryptography, Block cipher, Cryptanalysis and Internet privacy. His research in Computer security tackles topics such as Protocol which are related to areas like Radio-frequency identification. His work carried out in the field of Cryptography brings together such families of science as Hash function, Key, State and Secrecy.

His research integrates issues of Discrete mathematics, Theoretical computer science, Arithmetic and Block cipher mode of operation in his study of Block cipher. His research in Cryptanalysis intersects with topics in Cryptosystem, Side channel attack and Public-key cryptography. In his research on the topic of Internet privacy, World Wide Web is strongly related with Android.

He most often published in these fields:

  • Computer security (47.74%)
  • Cryptography (14.98%)
  • Block cipher (12.54%)

What were the highlights of his more recent work (between 2015-2021)?

  • Artificial intelligence (6.97%)
  • Adversarial system (6.62%)
  • Computer security (47.74%)

In recent papers he was focusing on the following fields of study:

David Wagner mainly focuses on Artificial intelligence, Adversarial system, Computer security, Artificial neural network and Robustness. His Artificial intelligence study combines topics in areas such as Machine learning, Computer vision and Pattern recognition. His Adversarial system research is multidisciplinary, incorporating perspectives in Computer engineering, Construct, Norm, Simple and Modular design.

In the field of Computer security, his study on Threat model overlaps with subjects such as Stateful firewall. David Wagner has included themes like Overhead, Inference, Bounded function and Identification in his Artificial neural network study. His Robustness research incorporates elements of Algorithm, Entropy minimization and k-nearest neighbors algorithm.

Between 2015 and 2021, his most popular works were:

  • Towards Evaluating the Robustness of Neural Networks (3170 citations)
  • Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples (956 citations)
  • Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods (776 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • The Internet

David Wagner mostly deals with Adversarial system, Artificial neural network, Artificial intelligence, Computer security and Machine learning. His Adversarial system research includes elements of Construct and Computer engineering. Computer security is represented through his Masking, Threat model, Information privacy, Mobile privacy and Privacy software research.

His biological study spans a wide range of topics, including Adversary, Voice Tag, Protocol, Voice command device and Input method. His Machine learning research integrates issues from Simple and Robustness. His Robustness study integrates concerns from other disciplines, such as Adversarial machine learning and Malware.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Towards Evaluating the Robustness of Neural Networks

Nicholas Carlini;David Wagner.
ieee symposium on security and privacy (2017)

4880 Citations

Secure routing in wireless sensor networks: attacks and countermeasures

C. Karlof;D. Wagner.
ad hoc networks (2003)

4796 Citations

Practical techniques for searches on encrypted data

Dawn Xiaoding Song;D. Wagner;A. Perrig.
ieee symposium on security and privacy (2000)

4161 Citations

TinySec: a link layer security architecture for wireless sensor networks

Chris Karlof;Naveen Sastry;David Wagner.
international conference on embedded networked sensor systems (2004)

2332 Citations

Security in wireless sensor networks

Adrian Perrig;John Stankovic;David Wagner.
Communications of The ACM (2004)

2151 Citations

Android permissions demystified

Adrienne Porter Felt;Erika Chin;Steve Hanna;Dawn Song.
computer and communications security (2011)

1946 Citations

Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples

Anish Athalye;Nicholas Carlini;David A. Wagner.
international conference on machine learning (2018)

1819 Citations

Intercepting mobile communications: the insecurity of 802.11

Nikita Borisov;Ian Goldberg;David Wagner.
acm/ieee international conference on mobile computing and networking (2001)

1546 Citations

Android permissions: user attention, comprehension, and behavior

Adrienne Porter Felt;Elizabeth Ha;Serge Egelman;Ariel Haney.
symposium on usable privacy and security (2012)

1331 Citations

Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods

Nicholas Carlini;David Wagner.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security (2017)

1266 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing David Wagner

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 77

Bart Preneel

Bart Preneel

KU Leuven

Publications: 75

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 71

Orr Dunkelman

Orr Dunkelman

University of Haifa

Publications: 70

Somesh Jha

Somesh Jha

University of Wisconsin–Madison

Publications: 66

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 60

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 60

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 59

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 57

Mauro Conti

Mauro Conti

University of Padua

Publications: 55

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 54

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 53

Alex Biryukov

Alex Biryukov

University of Luxembourg

Publications: 51

Peng Liu

Peng Liu

Pennsylvania State University

Publications: 49

Vincent Rijmen

Vincent Rijmen

KU Leuven

Publications: 48

Pin-Yu Chen

Pin-Yu Chen

IBM (United States)

Publications: 48

Trending Scientists

John A. Hossack

John A. Hossack

University of Virginia

David F. Bocian

David F. Bocian

University of California, Riverside

Haibao Tang

Haibao Tang

Fujian Agriculture and Forestry University

Judith E. Smith

Judith E. Smith

University of Salford

Ülo Langel

Ülo Langel

Stockholm University

Marianne Wessling-Resnick

Marianne Wessling-Resnick

Harvard University

Richard B. Pearson

Richard B. Pearson

Peter MacCallum Cancer Centre

Gunnar Lidén

Gunnar Lidén

Lund University

Lydie Bougueleret

Lydie Bougueleret

Swiss Institute of Bioinformatics

Ana Fernandez-Sesma

Ana Fernandez-Sesma

Icahn School of Medicine at Mount Sinai

Niels Hovius

Niels Hovius

University of Potsdam

Moshe Bar

Moshe Bar

Bar-Ilan University

James W. Grau

James W. Grau

Texas A&M University

Robert Vermeiren

Robert Vermeiren

Leiden University Medical Center

Xavier Puéchal

Xavier Puéchal

Université Paris Cité

Emanuel Adler

Emanuel Adler

University of Toronto

Something went wrong. Please try again later.