Kevin Eykholt

According to our database1, Kevin Eykholt authored at least 10 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Physical Adversarial Examples for Object Detectors.
CoRR, 2018

Tyche: Risk-Based Permissions for Smart Home Platforms.
CoRR, 2018

Physical Adversarial Examples for Object Detectors.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

2017
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
IEEE Security & Privacy, 2017

Note on Attacking Object Detectors with Adversarial Stickers.
CoRR, 2017

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
CoRR, 2017

Robust Physical-World Attacks on Machine Learning Models.
CoRR, 2017

Ensuring Authorized Updates in Multi-user Database-Backed Applications.
Proceedings of the 26th USENIX Security Symposium, 2017

Heimdall: A Privacy-Respecting Implicit Preference Collection Framework.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2013
A Matlab toolbox for visualization of image manifolds.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013


  Loading...