H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 90 Citations 61,286 225 World Ranking 268 National Ranking 162

Research.com Recognitions

Awards & Achievements

2003 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer security
  • Cryptography

His scientific interests lie mostly in Computer security, Cryptography, Computer network, Encryption and Wireless sensor network. His Computer security research incorporates themes from Android and Protocol. His study in Cryptography is interdisciplinary in nature, drawing from both Secrecy and Cipher.

His Static routing study, which is part of a larger body of work in Computer network, is frequently linked to Mimicry, bridging the gap between disciplines. David Wagner has researched Wireless sensor network in several fields, including Key distribution in wireless sensor networks, Optimized Link State Routing Protocol and Zone Routing Protocol. His work deals with themes such as Ciphertext and Server, which intersect with Block cipher.

His most cited work include:

  • Towards Evaluating the Robustness of Neural Networks (3170 citations)
  • Secure routing in wireless sensor networks: attacks and countermeasures (2764 citations)
  • Practical techniques for searches on encrypted data (2323 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Cryptography, Block cipher, Cryptanalysis and Internet privacy. His research in Computer security tackles topics such as Protocol which are related to areas like Radio-frequency identification. His work carried out in the field of Cryptography brings together such families of science as Hash function, Key, State and Secrecy.

His research integrates issues of Discrete mathematics, Theoretical computer science, Arithmetic and Block cipher mode of operation in his study of Block cipher. His research in Cryptanalysis intersects with topics in Cryptosystem, Side channel attack and Public-key cryptography. In his research on the topic of Internet privacy, World Wide Web is strongly related with Android.

He most often published in these fields:

  • Computer security (47.74%)
  • Cryptography (14.98%)
  • Block cipher (12.54%)

What were the highlights of his more recent work (between 2015-2021)?

  • Artificial intelligence (6.97%)
  • Adversarial system (6.62%)
  • Computer security (47.74%)

In recent papers he was focusing on the following fields of study:

David Wagner mainly focuses on Artificial intelligence, Adversarial system, Computer security, Artificial neural network and Robustness. His Artificial intelligence study combines topics in areas such as Machine learning, Computer vision and Pattern recognition. His Adversarial system research is multidisciplinary, incorporating perspectives in Computer engineering, Construct, Norm, Simple and Modular design.

In the field of Computer security, his study on Threat model overlaps with subjects such as Stateful firewall. David Wagner has included themes like Overhead, Inference, Bounded function and Identification in his Artificial neural network study. His Robustness research incorporates elements of Algorithm, Entropy minimization and k-nearest neighbors algorithm.

Between 2015 and 2021, his most popular works were:

  • Towards Evaluating the Robustness of Neural Networks (3170 citations)
  • Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples (956 citations)
  • Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods (776 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • The Internet

David Wagner mostly deals with Adversarial system, Artificial neural network, Artificial intelligence, Computer security and Machine learning. His Adversarial system research includes elements of Construct and Computer engineering. Computer security is represented through his Masking, Threat model, Information privacy, Mobile privacy and Privacy software research.

His biological study spans a wide range of topics, including Adversary, Voice Tag, Protocol, Voice command device and Input method. His Machine learning research integrates issues from Simple and Robustness. His Robustness study integrates concerns from other disciplines, such as Adversarial machine learning and Malware.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Secure routing in wireless sensor networks: attacks and countermeasures

C. Karlof;D. Wagner.
ad hoc networks (2003)

4476 Citations

Practical techniques for searches on encrypted data

Dawn Xiaoding Song;D. Wagner;A. Perrig.
ieee symposium on security and privacy (2000)

3567 Citations

Towards Evaluating the Robustness of Neural Networks

Nicholas Carlini;David Wagner.
ieee symposium on security and privacy (2017)

2195 Citations

TinySec: a link layer security architecture for wireless sensor networks

Chris Karlof;Naveen Sastry;David Wagner.
international conference on embedded networked sensor systems (2004)

2183 Citations

Security in wireless sensor networks

Adrian Perrig;John Stankovic;David Wagner.
Communications of The ACM (2004)

1980 Citations

Android permissions demystified

Adrienne Porter Felt;Erika Chin;Steve Hanna;Dawn Song.
computer and communications security (2011)

1698 Citations

Intercepting mobile communications: the insecurity of 802.11

Nikita Borisov;Ian Goldberg;David Wagner.
acm/ieee international conference on mobile computing and networking (2001)

1497 Citations

Analyzing inter-application communication in Android

Erika Chin;Adrienne Porter Felt;Kate Greenwood;David Wagner.
international conference on mobile systems, applications, and services (2011)

1137 Citations

Android permissions: user attention, comprehension, and behavior

Adrienne Porter Felt;Elizabeth Ha;Serge Egelman;Ariel Haney.
symposium on usable privacy and security (2012)

1115 Citations

Privacy and security in library RFID: issues, practices, and architectures

David Molnar;David Wagner.
computer and communications security (2004)

1004 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing David Wagner

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 77

Bart Preneel

Bart Preneel

KU Leuven

Publications: 75

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 71

Orr Dunkelman

Orr Dunkelman

University of Haifa

Publications: 70

Somesh Jha

Somesh Jha

University of Wisconsin–Madison

Publications: 66

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 60

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 60

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 59

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 57

Mauro Conti

Mauro Conti

University of Padua

Publications: 55

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 54

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 53

Alex Biryukov

Alex Biryukov

University of Luxembourg

Publications: 51

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 49

Vincent Rijmen

Vincent Rijmen

KU Leuven

Publications: 48

Pin-Yu Chen

Pin-Yu Chen

IBM (United States)

Publications: 48

Something went wrong. Please try again later.