Sotabase
Home
Researchers
Career
·
Software Engineer
,
Oasis Labs
2018–
Publications
(22)
Generating Adversarial Examples with Adversarial Networks
International Joint Conference on Artificial Intelligence · 2018
997
cited
Spatially Transformed Adversarial Examples
International Conference on Learning Representations · 2018
559
cited
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
European Symposium on Security and Privacy · 2018
407
cited
Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms
European Conference on Computer Vision · 2018
276
cited
Proof of Luck: an Efficient Blockchain Consensus Protocol
SysTEX@Middleware · 2016
258
cited
Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong
arXiv.org · 2017
242
cited
Adversarial Example Defense: Ensembles of Weak Defenses are not Strong
Workshop on Offensive Technologies · 2017
206
cited
The Emperor's New Password Manager: Security Analysis of Web-based Password Managers
USENIX Security Symposium · 2014
185
cited
Decision Boundary Analysis of Adversarial Examples
International Conference on Learning Representations · 2018
144
cited
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution
arXiv.org · 2018
107
cited
ShadowCrypt: Encrypted Web Applications for Everyone
Conference on Computer and Communications Security · 2014
101
cited
Reducing attack surfaces for intra-application communication in android
Security and Privacy in Smartphones and Mobile Devices · 2012
80
cited
Characterizing Attacks on Deep Reinforcement Learning
Adaptive Agents and Multi-Agent Systems · 2019
77
cited
Clickjacking Revisited A Perceptual View of UI Security
2013
45
cited
Data-Confined HTML5 Applications
European Symposium on Research in Computer Security · 2013
27
cited
Do I Get the Privacy I Need? Benchmarking Utility in Differential Privacy Libraries
arXiv.org · 2021
17
cited
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers
Proceedings on Privacy Enhancing Technologies · 2018
13
cited
Black-box Attacks on Deep Neural Networks via Gradient Estimation
International Conference on Learning Representations · 2018
8
cited
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
IEEE Security and Privacy · 2020
8
cited
ASPIRE: Iterative Specification Synthesis for Security
USENIX Workshop on Hot Topics in Operating Systems · 2015
5
cited
Show all 22 papers →
Sotabase
Warren He | Researcher Profile | Sotabase | Sotabase