David Evans

Orcid: 0000-0001-7988-8943

Affiliations:
  • University of Virginia, Charlottesville, USA
  • MIT, Cambridge, MA, USA (PhD 2000)


According to our database1, David Evans authored at least 122 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Do Membership Inference Attacks Work on Large Language Models?
CoRR, 2024

2023
Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks.
CoRR, 2023

SoK: Memorization in General-Purpose Large Language Models.
CoRR, 2023

SoK: Pitfalls in Evaluating Black-Box Attacks.
CoRR, 2023

When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
CoRR, 2023

Challenges towards the Next Frontier in Privacy.
CoRR, 2023

TrojanPuzzle: Covertly Poisoning Code-Suggestion Models.
CoRR, 2023

Efficient Privacy-Preserving Stochastic Nonconvex Optimization.
Proceedings of the Uncertainty in Artificial Intelligence, 2023

SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

GlucoSynth: Generating Differentially-Private Synthetic Glucose Traces.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Manipulating Transfer Learning for Property Inference.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Stealthy Backdoors as Compression Artifacts.
IEEE Trans. Inf. Forensics Secur., 2022

Dynamic System Diversification for Securing Cloud-based IoT Subnetworks.
ACM Trans. Auton. Adapt. Syst., 2022

Formalizing and Estimating Distribution Inference Risks.
Proc. Priv. Enhancing Technol., 2022

Dissecting Distribution Inference.
CoRR, 2022

Comfortable Cohorts and Tractable Teams: Making Large Computing Theory Courses Feel Small.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Understanding Intrinsic Robustness Using Label Uncertainty.
Proceedings of the Tenth International Conference on Learning Representations, 2022

An Empirical Analysis of Memorization in Fine-tuned Autoregressive Language Models.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Balanced Adversarial Training: Balancing Tradeoffs between Fickleness and Obstinacy in NLP Models.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Are Attribute Inference Attacks Just Imputation?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Revisiting Membership Inference Under Realistic Assumptions.
Proc. Priv. Enhancing Technol., 2021

Advances and Open Problems in Federated Learning.
Found. Trends Mach. Learn., 2021

Formalizing Distribution Inference Risks.
CoRR, 2021

Model-Targeted Poisoning Attacks with Provable Convergence.
Proceedings of the 38th International Conference on Machine Learning, 2021

Improved Estimation of Concentration Under ℓp-Norm Distance Metrics Using Half Spaces.
Proceedings of the 9th International Conference on Learning Representations, 2021

Fourth International Workshop on Dependable and Secure Machine Learning - DSML 2021.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

When Models Learn Too Much.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
An Attack-Resilient Architecture for the Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2020

Predictability of IP Address Allocations for Cloud Computing Platforms.
IEEE Trans. Inf. Forensics Secur., 2020

Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds.
CoRR, 2020

Revisiting Membership Inference Under Realistic Assumptions.
CoRR, 2020

One Neuron to Fool Them All.
CoRR, 2020

Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.
Proceedings of the 29th USENIX Security Symposium, 2020

Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization.
Proceedings of the 37th International Conference on Machine Learning, 2020

Finding Friends and Flipping Frenemies: Automatic Paraphrase Dataset Augmentation Using Graph Theory.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

Third International Workshop on Dependable and Secure Machine Learning - DSML 2020.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020

Understanding the Intrinsic Robustness of Image Distributions using Conditional Generative Models.
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020

2019
Advances and Open Problems in Federated Learning.
CoRR, 2019

Efficient Privacy-Preserving Nonconvex Optimization.
CoRR, 2019

When Relaxations Go Bad: "Differentially-Private" Machine Learning.
CoRR, 2019

Evaluating Differentially Private Machine Learning in Practice.
Proceedings of the 28th USENIX Security Symposium, 2019

Empirically Measuring Concentration: Fundamental Limits on Intrinsic Robustness.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Context-aware Monitoring in Robotic Surgery.
Proceedings of the International Symposium on Medical Robotics, 2019

Cost-Sensitive Robustness against Adversarial Examples.
Proceedings of the 7th International Conference on Learning Representations, 2019

2018
Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds.
IEEE Trans. Inf. Forensics Secur., 2018

Efficient Dynamic Searchable Encryption with Forward Privacy.
Proc. Priv. Enhancing Technol., 2018

Optimizing Trees for Static Searchable Encryption.
IACR Cryptol. ePrint Arch., 2018

A Pragmatic Introduction to Secure Multi-Party Computation.
Found. Trends Priv. Secur., 2018

Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning.
CoRR, 2018

Distributed Learning without Distress: Privacy-Preserving Empirical Risk Minimization.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

DSML 2018 Introduction.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Fidelius Charm: Isolating Unsafe Rust Code.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data.
Proc. Priv. Enhancing Technol., 2017

Query-limited Black-box Attacks to Classifiers.
CoRR, 2017

Feature Squeezing Mitigates and Detects Carlini/Wagner Adversarial Examples.
CoRR, 2017

Horcrux: A Password Manager for Paranoids.
CoRR, 2017

Decentralized Certificate Authorities.
CoRR, 2017

2016
Secure Linear Regression on Vertically Partitioned Datasets.
IACR Cryptol. ePrint Arch., 2016

Secure Stable Matching at Scale.
IACR Cryptol. ePrint Arch., 2016

Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Obliv-C: A Language for Extensible Data-Oblivious Computation.
IACR Cryptol. ePrint Arch., 2015

Understanding and Monitoring Embedded Web Scripts.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates.
IACR Cryptol. ePrint Arch., 2014

SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
IACR Cryptol. ePrint Arch., 2013

Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Circuit Structures for Improving Efficiency of Security and Privacy Tools.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Effectiveness of Moving Target Defenses.
Proceedings of the Moving Target Defense, 2011

Measuring Security.
IEEE Secur. Priv., 2011

Guest Editors' Introduction: The Science of Security.
IEEE Secur. Priv., 2011

GuardRails: A Data-Centric Web Application Security Framework.
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011

Faster Secure Two-Party Computation Using Garbled Circuits.
Proceedings of the 20th USENIX Security Symposium, 2011

Privacy-Preserving Applications on Smartphones.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Auditing Information Leakage for Distance Metrics.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Efficient Privacy-Preserving Biometric Identification.
Proceedings of the Network and Distributed System Security Symposium, 2011

Efficient Secure Computation with Garbled Circuits.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Private Editing Using Untrusted Cloud Services.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Protecting Private Web Content from Embedded Scripts.
Proceedings of the Computer Security - ESORICS 2011, 2011

Automated black-box detection of side-channel vulnerabilities in web applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2009
Privacy through Noise: A Design Space for Private Identification.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Reverse-Engineering a Cryptographic RFID Tag.
Proceedings of the 17th USENIX Security Symposium, 2008

Talking to strangers without taking their candy: isolating proxied content.
Proceedings of the 1st Workshop on Social Network Systems, 2008

Hiding in Groups: On the Expressiveness of Privacy Distributions.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

The user is not the enemy: fighting malware by tracking user intentions.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

Security through redundant data diversity.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2006
Comparing Java and .NET security: Lessons learned and missed.
Comput. Secur., 2006

Secure and practical defense against code-injection attacks using software dynamic translation.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

N-Variant Systems: A Secretless Framework for Security through Diversity.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Perracotta: mining temporal API rules from imperfect traces.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Inculcating invariants in introductory courses.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
Toasters, Seat Belts, and Inferring Program Properties.
Proceedings of the Verified Software: Theories, 2005

Where's the FEEB? The Effectiveness of Instruction Set Randomization.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Automatically Hardening Web Applications Using Precise Tainting.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

2004
ICSE 2004 workshop summary second international workshop on dynamic analysis (WODA 2004).
ACM SIGSOFT Softw. Eng. Notes, 2004

Pancakes, puzzles, and polynomials: cracking the Cracker Barrel.
SIGACT News, 2004

Election Security: Perception and Reality.
IEEE Secur. Priv., 2004

What Biology Can (and Can't) Teach Us About Security.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Dynamically inferring temporal properties.
Proceedings of the 2004 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2004

Using Directional Antennas to Prevent Wormhole Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2004

Localization for mobile sensor networks.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

Automatically Inferring Temporal Properties for Program Evolution .
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004

Second International Workshop on Dynamic Analysis (WODA 2004).
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004

EnviroTrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

.NET Security: Lessons Learned and Missed from Java.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Secure Aggregation for Wireless Network.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

A biological programming model for self-healing.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

2002
Improving Security Using Extensible Lightweight Static Analysis.
IEEE Softw., 2002

A biologically inspired programming model for self-healing systems.
Proceedings of the First Workshop on Self-Healing Systems, 2002

2001
Statically Detecting Likely Buffer Overflow Vulnerabilities.
Proceedings of the 10th USENIX Security Symposium, 2001

Behavior Combination and Swarm Programming.
Proceedings of the RoboCup 2001: Robot Soccer World Cup V, 2001

2000
Policy-directed code safety.
PhD thesis, 2000

Dynamic term selection in learning a query from examples.
Proceedings of the Computer-Assisted Information Retrieval (Recherche d'Information et ses Applications), 2000

1999
Flexible Policy-Directed Code Safety.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

1996
Computer assisted programming for systolic systems.
Bull. dInformatique Approfondie et Appl., 1996

Static Detection of Dynamic Memory Errors.
Proceedings of the ACM SIGPLAN'96 Conference on Programming Language Design and Implementation (PLDI), 1996

1994
LCLint: A Tool for Using Specifications to Check Code.
Proceedings of the Second ACM SIGSOFT Symposium on Foundations of Software Engineering, 1994


  Loading...