D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 65 Citations 23,171 179 World Ranking 1151 National Ranking 678

Research.com Recognitions

Awards & Achievements

2008 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Computer security

His primary areas of investigation include Computer security, Cryptography, The Internet, Anonymity and Computer network. His Computer security study frequently links to other fields, such as Ubiquitous computing. His Ubiquitous computing research is multidisciplinary, incorporating perspectives in Patient safety, Communications protocol, Software-defined radio, Software and Occupational safety and health.

Tadayoshi Kohno interconnects Hash table, Embedded system and Internet privacy in the investigation of issues within Cryptography. His research integrates issues of Firewall, Multimedia and Honeypot in his study of The Internet. His study in Anonymity is interdisciplinary in nature, drawing from both Consistency and Random oracle, Encryption, Public-key cryptography.

His most cited work include:

  • Experimental Security Analysis of a Modern Automobile (1159 citations)
  • Comprehensive experimental analyses of automotive attack surfaces (866 citations)
  • Robust Physical-World Attacks on Deep Learning Visual Classification (625 citations)

What are the main themes of his work throughout his whole career to date?

Tadayoshi Kohno mainly focuses on Computer security, Internet privacy, Cryptography, Encryption and Computer network. His Computer security research is multidisciplinary, relying on both Wireless and Cloud computing security. In general Internet privacy study, his work on Information privacy often relates to the realm of Work and Contact tracing, thereby connecting several areas of interest.

Cryptography connects with themes related to Embedded system in his study. Hash function is closely connected to Theoretical computer science in his research, which is encompassed under the umbrella topic of Encryption. In his research, Cryptographic protocol and SSH File Transfer Protocol is intimately related to Secure Shell, which falls under the overarching field of Authenticated encryption.

He most often published in these fields:

  • Computer security (48.89%)
  • Internet privacy (18.22%)
  • Cryptography (12.00%)

What were the highlights of his more recent work (between 2016-2021)?

  • Internet privacy (18.22%)
  • Computer security (48.89%)
  • Artificial intelligence (5.78%)

In recent papers he was focusing on the following fields of study:

Tadayoshi Kohno mostly deals with Internet privacy, Computer security, Artificial intelligence, Adversarial system and Augmented reality. His Internet privacy study combines topics from a wide range of disciplines, such as Online advertising and The Internet. Computer security is closely attributed to Best practice in his research.

His work on Deep learning as part of general Artificial intelligence study is frequently connected to Stop sign, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. His work deals with themes such as Information leakage and World Wide Web, which intersect with Adversarial system. His Augmented reality research includes elements of Immersion, Multi-user and Key.

Between 2016 and 2021, his most popular works were:

  • Robust Physical-World Attacks on Deep Learning Visual Classification (625 citations)
  • Robust Physical-World Attacks on Deep Learning Models (333 citations)
  • Robust Physical-World Attacks on Machine Learning Models. (143 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Computer network

Artificial intelligence, Adversarial system, Internet privacy, Machine learning and Deep learning are his primary areas of study. His Artificial intelligence study frequently links to related topics such as Detector. His studies in Detector integrate themes in fields like Object and Computer vision.

His Adversarial system research incorporates elements of Information sensitivity, Information leakage, Robustness and Big data. Tadayoshi Kohno combines subjects such as World Wide Web and Web content with his study of Internet privacy. Machine learning is closely attributed to Classifier in his study.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Experimental Security Analysis of a Modern Automobile

Karl Koscher;Alexei Czeskis;Franziska Roesner;Shwetak Patel.
ieee symposium on security and privacy (2010)

1599 Citations

Comprehensive experimental analyses of automotive attack surfaces

Stephen Checkoway;Damon McCoy;Brian Kantor;Danny Anderson.
usenix security symposium (2011)

1369 Citations

Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions

Michel Abdalla;Mihir Bellare;Dario Catalano;Eike Kiltz.
international cryptology conference (2005)

971 Citations

Remote physical device fingerprinting

T. Kohno;A. Broido;K.C. Claffy.
IEEE Transactions on Dependable and Secure Computing (2005)

919 Citations

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

D. Halperin;T.S. Heydt-Benjamin;B. Ransford;S.S. Clark.
ieee symposium on security and privacy (2008)

898 Citations

Analysis of an electronic voting system

T. Kohno;A. Stubblefield;A.D. Rubin;D.S. Wallach.
ieee symposium on security and privacy (2004)

761 Citations

Security and Privacy for Implantable Medical Devices

D. Halperin;T. Kohno;T.S. Heydt-Benjamin;K. Fu.
IEEE Pervasive Computing (2008)

508 Citations

Robust Physical-World Attacks on Deep Learning Visual Classification

Kevin Eykholt;Ivan Evtimov;Earlence Fernandes;Bo Li.
computer vision and pattern recognition (2018)

490 Citations

Vanish: increasing data privacy with self-destructing data

Roxana Geambasu;Tadayoshi Kohno;Amit A. Levy;Henry M. Levy.
usenix security symposium (2009)

488 Citations

Robust Physical-World Attacks on Deep Learning Models

Ivan Evtimov;Kevin Eykholt;Earlence Fernandes;Tadayoshi Kohno.
arXiv: Cryptography and Security (2017)

487 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Tadayoshi Kohno

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 39

Bart Preneel

Bart Preneel

KU Leuven

Publications: 39

Nikita Borisov

Nikita Borisov

University of Illinois at Urbana-Champaign

Publications: 34

Insup Lee

Insup Lee

University of Pennsylvania

Publications: 32

Orr Dunkelman

Orr Dunkelman

University of Haifa

Publications: 32

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 29

Kenneth G. Paterson

Kenneth G. Paterson

ETH Zurich

Publications: 28

Kevin Fu

Kevin Fu

University of Michigan–Ann Arbor

Publications: 28

David Wagner

David Wagner

University of California, Berkeley

Publications: 27

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 26

Yi Mu

Yi Mu

Fujian Normal University

Publications: 26

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 25

Prateek Mittal

Prateek Mittal

Princeton University

Publications: 24

Ari Juels

Ari Juels

Cornell University

Publications: 23

Ian Goldberg

Ian Goldberg

University of Waterloo

Publications: 23

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 22

Something went wrong. Please try again later.