


default search action
J. D. Tygar
- > Home > Persons > J. D. Tygar
Publications
- 2016
- [c71]Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph
, J. D. Tygar:
Reviewer Integration and Performance Measurement for Malware Detection. DIMVA 2016: 122-141 - [c69]Alex Kantchelian, J. D. Tygar, Anthony D. Joseph:
Evasion and Hardening of Tree Ensemble Classifiers. ICML 2016: 2387-2396 - 2015
- [c68]Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Brad Miller, Vaishaal Shankar, Rekha Bachwani, Anthony D. Joseph
, J. Doug Tygar:
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. AISec@CCS 2015: 45-56 - [c67]David Fifield, Alexandru Geana, Luis MartinGarcia, Mathias Morbitzer, J. Doug Tygar:
Remote Operating System Classification over IPv6. AISec@CCS 2015: 57-67 - [i8]Alex Kantchelian, J. D. Tygar, Anthony D. Joseph:
Evasion and Hardening of Tree Ensemble Classifiers. CoRR abs/1509.07892 (2015) - [i7]Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar:
Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR abs/1510.07338 (2015) - 2014
- [c65]Brad Miller, Alex Kantchelian, Sadia Afroz, Rekha Bachwani, Edwin Dauber
, Ling Huang, Michael Carl Tschantz, Anthony D. Joseph
, J. Doug Tygar:
Adversarial Active Learning. AISec@CCS 2014: 3-14 - [c64]Alex Kantchelian, Michael Carl Tschantz, Ling Huang, Peter L. Bartlett, Anthony D. Joseph, J. Doug Tygar:
Large-Margin Convex Polytope Machine. NIPS 2014: 3248-3256 - [c63]Brad Miller, Ling Huang, Anthony D. Joseph
, J. D. Tygar:
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. Privacy Enhancing Technologies 2014: 143-163 - [i6]Brad Miller, Ling Huang, Anthony D. Joseph, J. Doug Tygar:
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. CoRR abs/1403.0297 (2014) - [i5]Michael Carl Tschantz, Sadia Afroz, Vern Paxson, J. Doug Tygar:
On Modeling the Costs of Censorship. CoRR abs/1409.3211 (2014) - 2013
- [j21]Anthony D. Joseph, Pavel Laskov, Fabio Roli, J. Doug Tygar, Blaine Nelson:
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). Dagstuhl Manifestos 3(1): 1-30 (2013) - [j20]Phoebus Chen, Kirak Hong, Nikhil Naikal, S. Shankar Sastry, J. Doug Tygar, Posu Yan, Allen Y. Yang, Lung-Chung Chang, Leon Lin, Simon Wang, Edgar J. Lobaton
, Songhwai Oh, Parvez Ahammad:
A low-bandwidth camera sensor platform with applications in smart camera networks. ACM Trans. Sens. Networks 9(2): 21:1-21:23 (2013) - [c61]Alex Kantchelian, Sadia Afroz, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph
, J. D. Tygar:
Approaches to adversarial drift. AISec 2013: 99-110 - 2012
- [j19]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar:
Query Strategies for Evading Convex-Inducing Classifiers. J. Mach. Learn. Res. 13: 1293-1332 (2012) - [c60]Alex Kantchelian, Justin Ma, Ling Huang, Sadia Afroz, Anthony D. Joseph
, J. D. Tygar:
Robust detection of comment spam using entropy rate. AISec 2012: 59-70 - [c59]Brad Miller, Kaitlyn Buck, J. D. Tygar:
Systematic analysis and evaluation of web privacy policies and implementations. ICITST 2012: 534-540 - [i4]Anthony D. Joseph, Pavel Laskov, Fabio Roli, J. Doug Tygar, Blaine Nelson:
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). Dagstuhl Reports 2(9): 109-130 (2012) - 2011
- [c58]Ling Huang, Anthony D. Joseph
, Blaine Nelson, Benjamin I. P. Rubinstein
, J. D. Tygar:
Adversarial machine learning. AISec 2011: 43-58 - [c57]Yi-Ruei Chen, J. D. Tygar, Wen-Guey Tzeng:
Secure group key management using uni-directional proxy re-encryption schemes. INFOCOM 2011: 1952-1960 - 2010
- [j17]Marco Barreno, Blaine Nelson, Anthony D. Joseph
, J. D. Tygar:
The security of machine learning. Mach. Learn. 81(2): 121-148 (2010) - [j16]Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar:
Secure encrypted-data aggregation for wireless sensor networks. Wirel. Networks 16(4): 915-927 (2010) - [c56]Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigaki:
CAPTCHA Using Strangeness in Machine Translation. AINA 2010: 430-437 - [c55]Blaine Nelson, Benjamin I. P. Rubinstein
, Ling Huang, Anthony D. Joseph
, J. D. Tygar:
Classifier Evasion: Models and Open Problems. PSDML 2010: 92-98 - [c54]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. Doug Tygar:
Near-Optimal Evasion of Convex-Inducing Classifiers. AISTATS 2010: 549-556 - [i3]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. D. Tygar:
Near-Optimal Evasion of Convex-Inducing Classifiers. CoRR abs/1003.2751 (2010) - [i2]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar:
Query Strategies for Evading Convex-Inducing Classifiers. CoRR abs/1007.0484 (2010) - 2009
- [j15]Yu-Lun Huang, P. H. Lu, J. Doug Tygar, Anthony D. Joseph
:
OSNP: Secure wireless authentication protocol using one-time key. Comput. Secur. 28(8): 803-815 (2009) - [j13]Benjamin I. P. Rubinstein
, Blaine Nelson, Ling Huang, Anthony D. Joseph
, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar:
Stealthy poisoning attacks on PCA-based anomaly detectors. SIGMETRICS Perform. Evaluation Rev. 37(2): 73-74 (2009) - [j12]Li Zhuang, Feng Zhou, J. D. Tygar:
Keyboard acoustic emanations revisited. ACM Trans. Inf. Syst. Secur. 13(1): 3:1-3:26 (2009) - [c53]Benjamin I. P. Rubinstein
, Blaine Nelson, Ling Huang, Anthony D. Joseph
, Shing-hon Lau, Satish Rao, Nina Taft
, J. D. Tygar:
ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Internet Measurement Conference 2009: 1-14 - [c52]Chris Karlof, J. Doug Tygar, David A. Wagner:
Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. NDSS 2009 - [c51]Chris Karlof, J. D. Tygar, David A. Wagner:
Conditioned-safe ceremonies and a user study of an application to web authentication. SOUPS 2009 - 2008
- [c50]Marco Barreno, Peter L. Bartlett
, Fuching Jack Chi, Anthony D. Joseph
, Blaine Nelson, Benjamin I. P. Rubinstein
, Udam Saini, J. Doug Tygar:
Open problems in the security of learning. AISec 2008: 19-26 - [c48]Phoebus Chen, Parvez Ahammad, Colby Boyer, Shih-I Huang, Leon Lin, Edgar J. Lobaton
, Marci Meingast, Songhwai Oh, Simon Wang, Posu Yan, Allen Y. Yang, Chuohao Yeo, Lung-Chung Chang, J. Doug Tygar, Shankar Sastry:
CITRIC: A low-bandwidth wireless camera network platform. ICDSC 2008: 1-10 - [c47]Chris Karlof, J. Doug Tygar, David A. Wagner:
A User Study Design for Comparing the Security of Registration Protocols. UPSEC 2008 - [c46]Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. Doug Tygar, Kai Xia:
Exploiting Machine Learning to Subvert Your Spam Filter. LEET 2008 - [c45]Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar:
Characterizing Botnets from Email Spam Records. LEET 2008 - [c44]Benjamin I. P. Rubinstein
, Blaine Nelson, Ling Huang, Anthony D. Joseph
, Shing-hon Lau, Nina Taft, J. Doug Tygar:
Evading Anomaly Detection through Variance Injection Attacks on PCA. RAID 2008: 394-395 - [c43]Yu-Lun Huang, J. Doug Tygar, Hsiao-Ying Lin, L. Y. Yeh, Hsin-Yi Tsai, Keith Sklower, Shiuh-Pyng Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, Chia-Wei Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong:
SWOON: A Testbed for Secure Wireless Overlay Networks. CSET 2008 - 2007
- [j11]Li Zhuang, J. D. Tygar, Rachna Dhamija:
Injecting Heterogeneity Through Protocol Randomization. Int. J. Netw. Secur. 4(1): 45-58 (2007) - [c42]Chih-Chung Lin
, Yuan-Cheng Lai, J. D. Tygar, Chuan-Kai Yang, Chi-Lung Chiang:
Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags. APWeb/WAIM Workshops 2007: 634-643 - [c41]Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner:
Dynamic pharming attacks and locked same-origin policies for web browsers. CCS 2007: 58-71 - [c40]Marco Barreno, Alvaro A. Cárdenas, J. Doug Tygar:
Optimal ROC Curve for a Combination of Classifiers. NIPS 2007: 57-64 - 2006
- [c39]Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph
, J. D. Tygar:
Can machine learning be secure? AsiaCCS 2006: 16-25 - [c38]Rachna Dhamija, J. D. Tygar, Marti A. Hearst:
Why phishing works. CHI 2006: 581-590 - 2005
- [c37]Li Zhuang, Feng Zhou, J. D. Tygar:
Keyboard acoustic emanations revisited. CCS 2005: 373-382 - [c36]Monica Chew, J. D. Tygar:
Collaborative Filtering CAPTCHAs. HIP 2005: 66-81 - [c35]Rachna Dhamija, J. D. Tygar:
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. HIP 2005: 127-141 - [c33]Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng
:
Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 - [c32]Rachna Dhamija, J. Doug Tygar:
The battle against phishing: Dynamic Security Skins. SOUPS 2005: 77-88 - [i1]Adrian Perrig, Dawn Song, Ran Canetti, J. D. Tygar, Bob Briscoe:
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction. RFC 4082: 1-22 (2005) - 2004
- [j10]Ruzena Bajcsy, Terry Benzel, Matt Bishop
, Robert Braden, Carla E. Brodley, Sonia Fahmy
, Sally Floyd, Wes Hardaker, Anthony D. Joseph
, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) - [c31]Monica Chew, J. D. Tygar:
Image Recognition CAPTCHAs. ISC 2004: 268-279 - [c30]Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar:
Distillation Codes and Applications to DoS Resistant Multicast Authentication. NDSS 2004 - [c29]Umesh Shankar, Monica Chew, J. D. Tygar:
Side Effects Are Not Sufficient to Authenticate Software. USENIX Security Symposium 2004: 89-102 - 2003
- [b1]Adrian Perrig, J. Doug Tygar:
Secure broadcast communication in wired and wireless networks. Springer 2003, ISBN 978-0-7923-7650-7, pp. I-XIX, 1-214 - 2002
- [j9]Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David E. Culler:
SPINS: Security Protocols for Sensor Networks. Wirel. Networks 8(5): 521-534 (2002) - [c27]Dawn Xiaodong Song, J. D. Tygar, David Zuckerman:
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. S&P 2002: 258-270 - 2001
- [c26]Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar:
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170 - [c25]Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar:
SPINS: security protocols for sensor netowrks. MobiCom 2001: 189-199 - [c24]Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar:
Efficient and Secure Source Authentication for Multicast. NDSS 2001 - [c23]Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar:
ELK, A New Protocol for Efficient Large-Group Key Distribution. S&P 2001: 247-262 - 2000
- [c22]Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
Efficient Authentication and Signing of Multicast Streams over Lossy Channels. S&P 2000: 56-73 - 1998
- [c19]Michael Harkavy, J. Doug Tygar, Hiroaki Kikuchi:
Electronic Auctions with Private Bids. USENIX Workshop on Electronic Commerce 1998 - 1995
- [j6]Marvin A. Sirbu
, J. Doug Tygar:
NetBill: an Internet commerce system optimized for network-delivered services. IEEE Wirel. Commun. 2(4): 34-39 (1995) - [c14]Marvin A. Sirbu
, J. D. Tygar:
NetBill: An Internet Commerce System Optimized for Network Delivered Services. COMPCON 1995: 20-25 - [c13]Sean W. Smith, David B. Johnson, J. D. Tygar:
Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. FTCS 1995: 361-370 - [c11]L. Jean Camp, Marvin A. Sirbu, J. Doug Tygar:
Token and Notational Money in Electronic Commerce. USENIX Workshop on Electronic Commerce 1995 - 1994
- [j5]Allan Heydon, J. D. Tygar:
Specifying and Checking UNIX Security Constraints. Comput. Syst. 7(1): 91-112 (1994) - [j3]L. Jean Camp, J. D. Tygar:
Providing Auditing While Protecting Privacy. Inf. Soc. 10(1): 59-71 (1994) - 1993
- [c9]Randal E. Bryant, J. D. Tygar, Lawrence P. Huang:
Geometric characterization of series-parallel variable resistor networks. ISCAS 1993: 2678-2681 - 1990
- [j2]Allan Heydon, Mark W. Maimone
, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski:
Miró: Visual Specification of Security. IEEE Trans. Software Eng. 16(10): 1185-1197 (1990) - 1989
- [c7]Michael O. Rabin, J. D. Tygar:
ITOSS: An Integrated Toolkit For Operating System Security. FODO 1989: 1-15 - [c6]Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski:
Constraining Pictures with Pictures. IFIP Congress 1989: 157-162 - [c5]Allan Heydon, Mark W. Maimone, J. Doug Tygar, Jeannette M. Wing, Amy Moormann Zaremski:
Micro tools. VL 1989: 86-91 - 1988
- [c4]Mark W. Maimone, J. Doug Tygar, Jeannette M. Wing:
Miro semantics for security. VL 1988: 45-51 - 1987
- [c3]Maurice Herlihy, J. D. Tygar:
How to Make Replicated Data Secure. CRYPTO 1987: 379-391

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-06 18:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint