Technical report on the cleverhans v2. 1.0 adversarial examples library N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ... arXiv preprint arXiv:1610.00768, 2016 | 800* | 2016 |
Adversarial examples in constrained domains R Sheatsley, N Papernot, M Weisman, G Verma, P McDaniel arXiv preprint arXiv:2011.01183, 2020 | 24* | 2020 |
Network traffic obfuscation: An adversarial machine learning approach G Verma, E Ciftcioglu, R Sheatsley, K Chan, L Scott MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-6, 2018 | 18 | 2018 |
On the Robustness of Domain Constraints R Sheatsley, B Hoak, E Pauley, Y Beugin, MJ Weisman, P McDaniel arXiv preprint arXiv:2105.08619, 2021 | 15 | 2021 |
Curie: Policy-based secure data exchange ZB Celik, A Acar, H Aksu, R Sheatsley, P McDaniel, AS Uluagac Proceedings of the ninth ACM conference on data and application security and …, 2019 | 8 | 2019 |
A Vision Toward an Internet of Battlefield Things (IoBT): Autonomous Classifying Sensor Network J Zhu, E McClave, Q Pham, S Polineni, S Reinhart, R Sheatsley, A Toth US Army Research Laboratory Adelphi United States, 2018 | 7 | 2018 |
Generating practical adversarial network traffic flows using NIDSGAN BE Zolbayar, R Sheatsley, P McDaniel, MJ Weisman, S Zhu, S Zhu, ... arXiv preprint arXiv:2203.06694, 2022 | 6 | 2022 |
Improving radioactive material localization by leveraging cyber-security model optimizations R Sheatsley, M Durbin, A Lintereur, P McDaniel IEEE Sensors Journal 21 (8), 9994-10006, 2021 | 6 | 2021 |
Evading Machine Learning Based Network Intrusion Detection Systems with GANs BE Zolbayar, R Sheatsley, P McDaniel, M Weisman, CA Kamhoua, ... Game Theory and Machine Learning for Cyber Security, 335-356, 2021 | 3 | 2021 |
Detection under privileged information ZB Celik, P McDaniel, R Izmailov, N Papernot, R Sheatsley, R Alvarez, ... Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 3 | 2018 |
Measuring and Mitigating the Risk of IP Reuse on Public Clouds E Pauley, R Sheatsley, B Hoak, Q Burke, Y Beugin, P McDaniel 2022 IEEE Symposium on Security and Privacy (SP), 558-575, 2022 | 2 | 2022 |
Physics-based misbehavior detection system for v2x communications AAA Salazar, PD McDaniel, R Sheatsley, J Petit SAE International Journal of Connected and Automated Vehicles 5 (12-05-03-0020), 2022 | 2 | 2022 |
Building a Privacy-Preserving Smart Camera System Y Beugin, Q Burke, B Hoak, R Sheatsley, E Pauley, G Tan, SR Hussain, ... Proceedings on Privacy Enhancing Technologies 2022 (2), 25-46, 2022 | 2 | 2022 |
Application Transiency: Towards a Fair Trade of Personal Information for Application Services R Alvarez, J Levenson, R Sheatsley, P McDaniel Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 2 | 2019 |
Heterogeneous information sharing of sensor information in contested environments JA Wampler, C Hsieh, A Toth, R Sheatsley Ground/Air Multisensor Interoperability, Integration, and Networking for …, 2017 | 2 | 2017 |
Experimental tests of Gamma-ray Localization Aided with Machine-learning (GLAM) capabilities M Durbin, R Sheatsley, P McDaniel, A Lintereur Nuclear Instruments and Methods in Physics Research Section A: Accelerators …, 2022 | 1 | 2022 |
Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices Y Beugin, Q Burke, B Hoak, R Sheatsley, E Pauley, G Tan, SR Hussain, ... arXiv preprint arXiv:2208.09776, 2022 | 1 | 2022 |
A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting K Domico, R Sheatsley, Y Beugin, Q Burke, P McDaniel arXiv preprint arXiv:2204.05780, 2022 | 1 | 2022 |
EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale E Pauley, K Domico, B Hoak, R Sheatsley, Q Burke, Y Beugin, ... arXiv preprint arXiv:2210.14999, 2022 | | 2022 |
The Space of Adversarial Strategies R Sheatsley, B Hoak, E Pauley, P McDaniel arXiv preprint arXiv:2209.04521, 2022 | | 2022 |