2003 - Fellow of Alfred P. Sloan Foundation
His scientific interests lie mostly in Computer security, Cryptography, Computer network, Encryption and Wireless sensor network. His Computer security research incorporates themes from Android and Protocol. His study in Cryptography is interdisciplinary in nature, drawing from both Secrecy and Cipher.
His Static routing study, which is part of a larger body of work in Computer network, is frequently linked to Mimicry, bridging the gap between disciplines. David Wagner has researched Wireless sensor network in several fields, including Key distribution in wireless sensor networks, Optimized Link State Routing Protocol and Zone Routing Protocol. His work deals with themes such as Ciphertext and Server, which intersect with Block cipher.
His primary areas of investigation include Computer security, Cryptography, Block cipher, Cryptanalysis and Internet privacy. His research in Computer security tackles topics such as Protocol which are related to areas like Radio-frequency identification. His work carried out in the field of Cryptography brings together such families of science as Hash function, Key, State and Secrecy.
His research integrates issues of Discrete mathematics, Theoretical computer science, Arithmetic and Block cipher mode of operation in his study of Block cipher. His research in Cryptanalysis intersects with topics in Cryptosystem, Side channel attack and Public-key cryptography. In his research on the topic of Internet privacy, World Wide Web is strongly related with Android.
David Wagner mainly focuses on Artificial intelligence, Adversarial system, Computer security, Artificial neural network and Robustness. His Artificial intelligence study combines topics in areas such as Machine learning, Computer vision and Pattern recognition. His Adversarial system research is multidisciplinary, incorporating perspectives in Computer engineering, Construct, Norm, Simple and Modular design.
In the field of Computer security, his study on Threat model overlaps with subjects such as Stateful firewall. David Wagner has included themes like Overhead, Inference, Bounded function and Identification in his Artificial neural network study. His Robustness research incorporates elements of Algorithm, Entropy minimization and k-nearest neighbors algorithm.
David Wagner mostly deals with Adversarial system, Artificial neural network, Artificial intelligence, Computer security and Machine learning. His Adversarial system research includes elements of Construct and Computer engineering. Computer security is represented through his Masking, Threat model, Information privacy, Mobile privacy and Privacy software research.
His biological study spans a wide range of topics, including Adversary, Voice Tag, Protocol, Voice command device and Input method. His Machine learning research integrates issues from Simple and Robustness. His Robustness study integrates concerns from other disciplines, such as Adversarial machine learning and Malware.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini;David Wagner.
ieee symposium on security and privacy (2017)
Secure routing in wireless sensor networks: attacks and countermeasures
C. Karlof;D. Wagner.
ad hoc networks (2003)
Practical techniques for searches on encrypted data
Dawn Xiaoding Song;D. Wagner;A. Perrig.
ieee symposium on security and privacy (2000)
TinySec: a link layer security architecture for wireless sensor networks
Chris Karlof;Naveen Sastry;David Wagner.
international conference on embedded networked sensor systems (2004)
Security in wireless sensor networks
Adrian Perrig;John Stankovic;David Wagner.
Communications of The ACM (2004)
Android permissions demystified
Adrienne Porter Felt;Erika Chin;Steve Hanna;Dawn Song.
computer and communications security (2011)
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Anish Athalye;Nicholas Carlini;David A. Wagner.
international conference on machine learning (2018)
Intercepting mobile communications: the insecurity of 802.11
Nikita Borisov;Ian Goldberg;David Wagner.
acm/ieee international conference on mobile computing and networking (2001)
Android permissions: user attention, comprehension, and behavior
Adrienne Porter Felt;Elizabeth Ha;Serge Egelman;Ariel Haney.
symposium on usable privacy and security (2012)
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
Nicholas Carlini;David Wagner.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security (2017)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: