H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 125 Citations 74,240 348 World Ranking 39 National Ranking 24

Research.com Recognitions

Awards & Achievements

2019 - ACM Fellow For contributions to security and privacy

2010 - Fellow of John Simon Guggenheim Memorial Foundation

2010 - Fellow of the MacArthur Foundation

2007 - Fellow of Alfred P. Sloan Foundation

Overview

What is she best known for?

The fields of study she is best known for:

  • Artificial intelligence
  • Operating system
  • The Internet

Her primary scientific interests are in Computer security, Computer network, Distributed computing, Artificial intelligence and Authentication. The study of Computer security is intertwined with the study of Signature in a number of ways. Her study looks at the relationship between Computer network and topics such as The Internet, which overlap with Packet switching.

Her Distributed computing study combines topics in areas such as Wireless sensor network and Wide area network. Her Artificial intelligence research is multidisciplinary, incorporating elements of Machine learning and Speech recognition. Her work deals with themes such as Intrusion detection system, Information privacy and Cryptography, which intersect with Encryption.

Her most cited work include:

  • Random key predistribution schemes for sensor networks (2746 citations)
  • Practical techniques for searches on encrypted data (2323 citations)
  • Provable data possession at untrusted stores (1848 citations)

What are the main themes of her work throughout her whole career to date?

Dawn Song mainly focuses on Computer security, Artificial intelligence, Machine learning, Theoretical computer science and Computer network. Her research ties Internet privacy and Computer security together. All of her Artificial intelligence and Deep learning, Adversarial system, Artificial neural network, Reinforcement learning and Inference investigations are sub-components of the entire Artificial intelligence study.

Her research on Machine learning frequently connects to adjacent areas such as Robustness. Her Theoretical computer science study typically links adjacent topics like Symbolic execution. Her biological study spans a wide range of topics, including Distributed computing and The Internet.

She most often published in these fields:

  • Computer security (26.86%)
  • Artificial intelligence (25.28%)
  • Machine learning (17.16%)

What were the highlights of her more recent work (between 2018-2021)?

  • Artificial intelligence (25.28%)
  • Machine learning (17.16%)
  • Computer security (26.86%)

In recent papers she was focusing on the following fields of study:

Dawn Song focuses on Artificial intelligence, Machine learning, Computer security, Theoretical computer science and Deep learning. In the subject of general Machine learning, her work in Reinforcement learning is often linked to Elementary mathematics, thereby combining diverse domains of study. When carried out as part of a general Computer security research project, her work on Cryptography and Confidentiality is frequently linked to work in Contact tracing and Trustworthiness, therefore connecting diverse disciplines of study.

Her studies examine the connections between Cryptography and genetics, as well as such issues in Key, with regards to Metadata, Security token, Focus and Intersection. Her studies in Theoretical computer science integrate themes in fields like Systems design and Randomized algorithm. She focuses mostly in the field of Deep learning, narrowing it down to topics relating to Anomaly detection and, in certain cases, Trojan and Filter.

Between 2018 and 2021, her most popular works were:

  • Advances and Open Problems in Federated Learning (571 citations)
  • Using Self-Supervised Learning Can Improve Model Robustness and Uncertainty (181 citations)
  • The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks (145 citations)

In her most recent research, the most cited papers focused on:

  • Artificial intelligence
  • Operating system
  • The Internet

The scientist’s investigation covers issues in Artificial intelligence, Machine learning, Anomaly detection, Software deployment and Robustness. Her work is connected to Artificial neural network, Deep learning, Taxonomy, Leverage and Benchmark, as a part of Artificial intelligence. Her Machine learning research includes elements of Adversarial system and Robotics.

Her Adversarial system research is multidisciplinary, incorporating perspectives in Classifier and Test set. The various areas that she examines in her Robustness study include Self supervised learning and Transformer. Her study in Set is interdisciplinary in nature, drawing from both Security token, Metadata, Cryptography and Key.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Random key predistribution schemes for sensor networks

Haowen Chan;A. Perrig;D. Song.
ieee symposium on security and privacy (2003)

4135 Citations

Practical techniques for searches on encrypted data

Dawn Xiaoding Song;D. Wagner;A. Perrig.
ieee symposium on security and privacy (2000)

3567 Citations

Provable data possession at untrusted stores

Giuseppe Ateniese;Randal Burns;Reza Curtmola;Joseph Herring.
computer and communications security (2007)

3001 Citations

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software

James Newsome;Dawn Xiaodong Song.
network and distributed system security symposium (2005)

2015 Citations

The Sybil attack in sensor networks: analysis & defenses

James Newsome;Elaine Shi;Dawn Song;Adrian Perrig.
information processing in sensor networks (2004)

1917 Citations

Android permissions demystified

Adrienne Porter Felt;Erika Chin;Steve Hanna;Dawn Song.
computer and communications security (2011)

1698 Citations

Efficient authentication and signing of multicast streams over lossy channels

A. Perrig;R. Canetti;J.D. Tygar;Dawn Song.
ieee symposium on security and privacy (2000)

1318 Citations

Advanced and authenticated marking schemes for IP traceback

Dawn Xiaodong Song;A. Perrig.
international conference on computer communications (2001)

1274 Citations

The TESLA Broadcast Authentication Protocol

Adrian Perrig;Ran Canetti;J. D. Tygar;Dawn Song.
RSA CryptoBytes (2002)

1166 Citations

Polygraph: automatically generating signatures for polymorphic worms

J. Newsome;B. Karp;D. Song.
ieee symposium on security and privacy (2005)

1148 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Dawn Song

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 99

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 92

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 90

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 83

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 77

Somesh Jha

Somesh Jha

University of Wisconsin–Madison

Publications: 75

Sencun Zhu

Sencun Zhu

Pennsylvania State University

Publications: 74

Kui Ren

Kui Ren

Zhejiang University

Publications: 72

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 72

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 71

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 71

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 71

Mauro Conti

Mauro Conti

University of Padua

Publications: 71

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 68

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 68

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 66

Something went wrong. Please try again later.