Warren He

According to our database1, Warren He authored at least 23 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Characterizing Attacks on Deep Reinforcement Learning.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

2021
Do I Get the Privacy I Need? Benchmarking Utility in Differential Privacy Libraries.
CoRR, 2021

2020
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
IEEE Secur. Priv., 2020

2019
Characterizing Attacks on Deep Reinforcement Learning.
CoRR, 2019

2018
Adaptive and Diverse Techniques for Generating Adversarial Examples.
PhD thesis, 2018

Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers.
Proc. Priv. Enhancing Technol., 2018

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution.
CoRR, 2018

Generating Adversarial Examples with Adversarial Networks.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Spatially Transformed Adversarial Examples.
Proceedings of the 6th International Conference on Learning Representations, 2018

Decision Boundary Analysis of Adversarial Examples.
Proceedings of the 6th International Conference on Learning Representations, 2018

Black-box Attacks on Deep Neural Networks via Gradient Estimation.
Proceedings of the 6th International Conference on Learning Representations, 2018

Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms.
Proceedings of the Computer Vision - ECCV 2018, 2018

2017
Proof of Luck: an Efficient Blockchain Consensus Protocol.
IACR Cryptol. ePrint Arch., 2017

Exploring the Space of Black-box Attacks on Deep Neural Networks.
CoRR, 2017

Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong.
CoRR, 2017

Adversarial Example Defense: Ensembles of Weak Defenses are not Strong.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

2016
Unified Power Frequency Model Framework.
Proceedings of the 2016 International Symposium on Low Power Electronics and Design, 2016

2015
ASPIRE: Iterative Specification Synthesis for Security.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
Clickjacking Revisited: A Perceptual View of UI Security.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

The Emperor's New Password Manager: Security Analysis of Web-based Password Managers.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

ShadowCrypt: Encrypted Web Applications for Everyone.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Data-Confined HTML5 Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Reducing attack surfaces for intra-application communication in android.
Proceedings of the SPSM'12, 2012


  Loading...