D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 66 Citations 22,382 206 World Ranking 1435 National Ranking 809

Research.com Recognitions

Awards & Achievements

2008 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Computer security

His primary areas of investigation include Computer security, Cryptography, The Internet, Anonymity and Computer network. His Computer security study frequently links to other fields, such as Ubiquitous computing. His Ubiquitous computing research is multidisciplinary, incorporating perspectives in Patient safety, Communications protocol, Software-defined radio, Software and Occupational safety and health.

Tadayoshi Kohno interconnects Hash table, Embedded system and Internet privacy in the investigation of issues within Cryptography. His research integrates issues of Firewall, Multimedia and Honeypot in his study of The Internet. His study in Anonymity is interdisciplinary in nature, drawing from both Consistency and Random oracle, Encryption, Public-key cryptography.

His most cited work include:

  • Experimental Security Analysis of a Modern Automobile (1159 citations)
  • Comprehensive experimental analyses of automotive attack surfaces (866 citations)
  • Robust Physical-World Attacks on Deep Learning Visual Classification (625 citations)

What are the main themes of his work throughout his whole career to date?

Tadayoshi Kohno mainly focuses on Computer security, Internet privacy, Cryptography, Encryption and Computer network. His Computer security research is multidisciplinary, relying on both Wireless and Cloud computing security. In general Internet privacy study, his work on Information privacy often relates to the realm of Work and Contact tracing, thereby connecting several areas of interest.

Cryptography connects with themes related to Embedded system in his study. Hash function is closely connected to Theoretical computer science in his research, which is encompassed under the umbrella topic of Encryption. In his research, Cryptographic protocol and SSH File Transfer Protocol is intimately related to Secure Shell, which falls under the overarching field of Authenticated encryption.

He most often published in these fields:

  • Computer security (48.89%)
  • Internet privacy (18.22%)
  • Cryptography (12.00%)

What were the highlights of his more recent work (between 2016-2021)?

  • Internet privacy (18.22%)
  • Computer security (48.89%)
  • Artificial intelligence (5.78%)

In recent papers he was focusing on the following fields of study:

Tadayoshi Kohno mostly deals with Internet privacy, Computer security, Artificial intelligence, Adversarial system and Augmented reality. His Internet privacy study combines topics from a wide range of disciplines, such as Online advertising and The Internet. Computer security is closely attributed to Best practice in his research.

His work on Deep learning as part of general Artificial intelligence study is frequently connected to Stop sign, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. His work deals with themes such as Information leakage and World Wide Web, which intersect with Adversarial system. His Augmented reality research includes elements of Immersion, Multi-user and Key.

Between 2016 and 2021, his most popular works were:

  • Robust Physical-World Attacks on Deep Learning Visual Classification (625 citations)
  • Robust Physical-World Attacks on Deep Learning Models (333 citations)
  • Robust Physical-World Attacks on Machine Learning Models. (143 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Computer network

Artificial intelligence, Adversarial system, Internet privacy, Machine learning and Deep learning are his primary areas of study. His Artificial intelligence study frequently links to related topics such as Detector. His studies in Detector integrate themes in fields like Object and Computer vision.

His Adversarial system research incorporates elements of Information sensitivity, Information leakage, Robustness and Big data. Tadayoshi Kohno combines subjects such as World Wide Web and Web content with his study of Internet privacy. Machine learning is closely attributed to Classifier in his study.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Experimental Security Analysis of a Modern Automobile

Karl Koscher;Alexei Czeskis;Franziska Roesner;Shwetak Patel.
ieee symposium on security and privacy (2010)

2009 Citations

Comprehensive experimental analyses of automotive attack surfaces

Stephen Checkoway;Damon McCoy;Brian Kantor;Danny Anderson.
usenix security symposium (2011)

1707 Citations

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

Michel Abdalla;Mihir Bellare;Dario Catalano;Eike Kiltz.
Journal of Cryptology (2008)

1088 Citations

Robust Physical-World Attacks on Deep Learning Visual Classification

Kevin Eykholt;Ivan Evtimov;Earlence Fernandes;Bo Li.
computer vision and pattern recognition (2018)

1085 Citations

Remote physical device fingerprinting

T. Kohno;A. Broido;K.C. Claffy.
IEEE Transactions on Dependable and Secure Computing (2005)

978 Citations

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

D. Halperin;T.S. Heydt-Benjamin;B. Ransford;S.S. Clark.
ieee symposium on security and privacy (2008)

969 Citations

Analysis of an electronic voting system

T. Kohno;A. Stubblefield;A.D. Rubin;D.S. Wallach.
ieee symposium on security and privacy (2004)

794 Citations

A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications

Mihir Bellare;Tadayoshi Kohno.
Lecture Notes in Computer Science (2003)

700 Citations

Cryptography Engineering: Design Principles and Practical Applications

Niels Ferguson;Bruce Schneier;Tadayoshi Kohno.
(2010)

651 Citations

Robust Physical-World Attacks on Deep Learning Models

Ivan Evtimov;Kevin Eykholt;Earlence Fernandes;Tadayoshi Kohno.
arXiv: Cryptography and Security (2017)

559 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Tadayoshi Kohno

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 39

Bart Preneel

Bart Preneel

KU Leuven

Publications: 39

Nikita Borisov

Nikita Borisov

University of Illinois at Urbana-Champaign

Publications: 34

Insup Lee

Insup Lee

University of Pennsylvania

Publications: 32

Orr Dunkelman

Orr Dunkelman

University of Haifa

Publications: 32

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 29

Kevin Fu

Kevin Fu

University of Michigan–Ann Arbor

Publications: 28

Kenneth G. Paterson

Kenneth G. Paterson

ETH Zurich

Publications: 28

David Wagner

David Wagner

University of California, Berkeley

Publications: 27

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 26

Yi Mu

Yi Mu

Fujian Normal University

Publications: 26

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 25

Prateek Mittal

Prateek Mittal

Princeton University

Publications: 24

Ari Juels

Ari Juels

Cornell University

Publications: 23

Ian Goldberg

Ian Goldberg

University of Waterloo

Publications: 23

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 22

Trending Scientists

Ralf Herbrich

Ralf Herbrich

Hasso Plattner Institute

Mendel Rosenblum

Mendel Rosenblum

Stanford University

Hiroshi Nagase

Hiroshi Nagase

University of Tsukuba

Siglinda Perathoner

Siglinda Perathoner

University of Messina

Allan D. Watt

Allan D. Watt

Natural Environment Research Council

Martin Spiess

Martin Spiess

University of Basel

Els Pardon

Els Pardon

Vrije Universiteit Brussel

František Hrouda

František Hrouda

Charles University

Sampat K. Tandon

Sampat K. Tandon

Indian Institute of Science Education and Research, Bhopal

Arnaud Pêcher

Arnaud Pêcher

Grenoble Alpes University

David L. T. Anderson

David L. T. Anderson

European Centre for Medium-Range Weather Forecasts

Uwe Heinemann

Uwe Heinemann

Charité - University Medicine Berlin

Lawrence D. Dorr

Lawrence D. Dorr

University of Southern California

Richard E. Sampliner

Richard E. Sampliner

University of Arizona

Yukio Sonoda

Yukio Sonoda

Memorial Sloan Kettering Cancer Center

Piero Rosati

Piero Rosati

University of Ferrara

Something went wrong. Please try again later.