On the robustness of domain constraints R Sheatsley, B Hoak, E Pauley, Y Beugin, MJ Weisman, P McDaniel Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 22 | 2021 |
Measuring and mitigating the risk of ip reuse on public clouds E Pauley, R Sheatsley, B Hoak, Q Burke, Y Beugin, P McDaniel 2022 IEEE Symposium on Security and Privacy (SP), 558-575, 2022 | 8 | 2022 |
Building a privacy-preserving smart camera system Y Beugin, Q Burke, B Hoak, R Sheatsley, E Pauley, G Tan, SR Hussain, ... arXiv preprint arXiv:2201.09338, 2022 | 5 | 2022 |
The space of adversarial strategies R Sheatsley, B Hoak, E Pauley, P McDaniel 32nd USENIX Security Symposium (USENIX Security 23), 3745-3761, 2023 | 4 | 2023 |
Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices Y Beugin, Q Burke, B Hoak, R Sheatsley, E Pauley, G Tan, SR Hussain, ... arXiv preprint arXiv:2208.09776, 2022 | 2 | 2022 |
Explorations in Texture Learning B Hoak, P McDaniel arXiv preprint arXiv:2403.09543, 2024 | | 2024 |
Is Memorization Actually Necessary for Generalization? H Abdullah, K Wang, B Hoak, Y Wang, SS Arora, Y Cai | | 2023 |
Systematic Evaluation of Geolocation Privacy Mechanisms A Héon, R Sheatsley, Q Burke, B Hoak, E Pauley, Y Beugin, P McDaniel arXiv preprint arXiv:2309.06263, 2023 | | 2023 |
Securing Cloud File Systems using Shielded Execution Q Burke, Y Beugin, B Hoak, R King, E Pauley, R Sheatsley, M Yu, T He, ... arXiv preprint arXiv:2305.18639, 2023 | | 2023 |
EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale E Pauley, K Domico, B Hoak, R Sheatsley, Q Burke, Y Beugin, ... arXiv preprint arXiv:2210.14999, 2022 | | 2022 |
List of External Reviewers CSF 2021 (all submission cycles) C Abate, AA de Amorim, T Antonopoulos, C Badertscher, G Battiston, ... | | |