default search action
J. D. Tygar
Person information
- affiliation: University of California, Berkeley, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j22]Lena Yuryna Connolly, Michael Lang, John Gathegi, J. Doug Tygar:
Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study. Inf. Comput. Secur. 25(2): 118-136 (2017) - 2016
- [c72]J. Doug Tygar:
Security Analytics in the Context of Adversarial Machine Learning. IWSPA@CODASPY 2016: 49 - [c71]Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar:
Reviewer Integration and Performance Measurement for Malware Detection. DIMVA 2016: 122-141 - [c70]Lena Yuryna Connolly, Michael Lang, John Gathegi, J. Doug Tygar:
The Effect of Organisational Culture on Employee Security Behaviour: A Qualitative Study. HAISA 2016: 33-44 - [c69]Alex Kantchelian, J. D. Tygar, Anthony D. Joseph:
Evasion and Hardening of Tree Ensemble Classifiers. ICML 2016: 2387-2396 - 2015
- [c68]Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Brad Miller, Vaishaal Shankar, Rekha Bachwani, Anthony D. Joseph, J. Doug Tygar:
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. AISec@CCS 2015: 45-56 - [c67]David Fifield, Alexandru Geana, Luis MartinGarcia, Mathias Morbitzer, J. Doug Tygar:
Remote Operating System Classification over IPv6. AISec@CCS 2015: 57-67 - [c66]Lena Yuryna Connolly, Michael Lang, J. Doug Tygar:
Investigation of Employee Security Behaviour: A Grounded Theory Approach. SEC 2015: 283-296 - [i8]Alex Kantchelian, J. D. Tygar, Anthony D. Joseph:
Evasion and Hardening of Tree Ensemble Classifiers. CoRR abs/1509.07892 (2015) - [i7]Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar:
Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR abs/1510.07338 (2015) - 2014
- [c65]Brad Miller, Alex Kantchelian, Sadia Afroz, Rekha Bachwani, Edwin Dauber, Ling Huang, Michael Carl Tschantz, Anthony D. Joseph, J. Doug Tygar:
Adversarial Active Learning. AISec@CCS 2014: 3-14 - [c64]Alex Kantchelian, Michael Carl Tschantz, Ling Huang, Peter L. Bartlett, Anthony D. Joseph, J. Doug Tygar:
Large-Margin Convex Polytope Machine. NIPS 2014: 3248-3256 - [c63]Brad Miller, Ling Huang, Anthony D. Joseph, J. D. Tygar:
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. Privacy Enhancing Technologies 2014: 143-163 - [c62]Lena Yuryna Connolly, Michael Lang, J. Doug Tygar:
Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values. SEC 2014: 417-430 - [i6]Brad Miller, Ling Huang, Anthony D. Joseph, J. Doug Tygar:
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. CoRR abs/1403.0297 (2014) - [i5]Michael Carl Tschantz, Sadia Afroz, Vern Paxson, J. Doug Tygar:
On Modeling the Costs of Censorship. CoRR abs/1409.3211 (2014) - 2013
- [j21]Anthony D. Joseph, Pavel Laskov, Fabio Roli, J. Doug Tygar, Blaine Nelson:
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). Dagstuhl Manifestos 3(1): 1-30 (2013) - [j20]Phoebus Chen, Kirak Hong, Nikhil Naikal, S. Shankar Sastry, J. Doug Tygar, Posu Yan, Allen Y. Yang, Lung-Chung Chang, Leon Lin, Simon Wang, Edgar J. Lobaton, Songhwai Oh, Parvez Ahammad:
A low-bandwidth camera sensor platform with applications in smart camera networks. ACM Trans. Sens. Networks 9(2): 21:1-21:23 (2013) - [c61]Alex Kantchelian, Sadia Afroz, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph, J. D. Tygar:
Approaches to adversarial drift. AISec 2013: 99-110 - 2012
- [j19]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar:
Query Strategies for Evading Convex-Inducing Classifiers. J. Mach. Learn. Res. 13: 1293-1332 (2012) - [c60]Alex Kantchelian, Justin Ma, Ling Huang, Sadia Afroz, Anthony D. Joseph, J. D. Tygar:
Robust detection of comment spam using entropy rate. AISec 2012: 59-70 - [c59]Brad Miller, Kaitlyn Buck, J. D. Tygar:
Systematic analysis and evaluation of web privacy policies and implementations. ICITST 2012: 534-540 - [i4]Anthony D. Joseph, Pavel Laskov, Fabio Roli, J. Doug Tygar, Blaine Nelson:
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). Dagstuhl Reports 2(9): 109-130 (2012) - 2011
- [j18]J. D. Tygar:
Adversarial Machine Learning. IEEE Internet Comput. 15(5): 4-6 (2011) - [c58]Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar:
Adversarial machine learning. AISec 2011: 43-58 - [c57]Yi-Ruei Chen, J. D. Tygar, Wen-Guey Tzeng:
Secure group key management using uni-directional proxy re-encryption schemes. INFOCOM 2011: 1952-1960 - 2010
- [j17]Marco Barreno, Blaine Nelson, Anthony D. Joseph, J. D. Tygar:
The security of machine learning. Mach. Learn. 81(2): 121-148 (2010) - [j16]Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar:
Secure encrypted-data aggregation for wireless sensor networks. Wirel. Networks 16(4): 915-927 (2010) - [c56]Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigaki:
CAPTCHA Using Strangeness in Machine Translation. AINA 2010: 430-437 - [c55]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, J. D. Tygar:
Classifier Evasion: Models and Open Problems. PSDML 2010: 92-98 - [c54]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. Doug Tygar:
Near-Optimal Evasion of Convex-Inducing Classifiers. AISTATS 2010: 549-556 - [i3]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. D. Tygar:
Near-Optimal Evasion of Convex-Inducing Classifiers. CoRR abs/1003.2751 (2010) - [i2]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar:
Query Strategies for Evading Convex-Inducing Classifiers. CoRR abs/1007.0484 (2010)
2000 – 2009
- 2009
- [j15]Yu-Lun Huang, P. H. Lu, J. Doug Tygar, Anthony D. Joseph:
OSNP: Secure wireless authentication protocol using one-time key. Comput. Secur. 28(8): 803-815 (2009) - [j14]Chien-Chun Ni, Tien-Ruey Hsiang, J. D. Tygar:
A power-preserving broadcast protocol for wireless sensor networks. Int. J. Sens. Networks 6(3/4): 191-198 (2009) - [j13]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar:
Stealthy poisoning attacks on PCA-based anomaly detectors. SIGMETRICS Perform. Evaluation Rev. 37(2): 73-74 (2009) - [j12]Li Zhuang, Feng Zhou, J. D. Tygar:
Keyboard acoustic emanations revisited. ACM Trans. Inf. Syst. Secur. 13(1): 3:1-3:26 (2009) - [c53]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar:
ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Internet Measurement Conference 2009: 1-14 - [c52]Chris Karlof, J. Doug Tygar, David A. Wagner:
Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. NDSS 2009 - [c51]Chris Karlof, J. D. Tygar, David A. Wagner:
Conditioned-safe ceremonies and a user study of an application to web authentication. SOUPS 2009 - 2008
- [c50]Marco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, Udam Saini, J. Doug Tygar:
Open problems in the security of learning. AISec 2008: 19-26 - [c49]Chien-Chun Ni, Tien-Ruey Hsiang, J. D. Tygar:
A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance. ICCCN 2008: 777-782 - [c48]Phoebus Chen, Parvez Ahammad, Colby Boyer, Shih-I Huang, Leon Lin, Edgar J. Lobaton, Marci Meingast, Songhwai Oh, Simon Wang, Posu Yan, Allen Y. Yang, Chuohao Yeo, Lung-Chung Chang, J. Doug Tygar, Shankar Sastry:
CITRIC: A low-bandwidth wireless camera network platform. ICDSC 2008: 1-10 - [c47]Chris Karlof, J. Doug Tygar, David A. Wagner:
A User Study Design for Comparing the Security of Registration Protocols. UPSEC 2008 - [c46]Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. Doug Tygar, Kai Xia:
Exploiting Machine Learning to Subvert Your Spam Filter. LEET 2008 - [c45]Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar:
Characterizing Botnets from Email Spam Records. LEET 2008 - [c44]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar:
Evading Anomaly Detection through Variance Injection Attacks on PCA. RAID 2008: 394-395 - [c43]Yu-Lun Huang, J. Doug Tygar, Hsiao-Ying Lin, L. Y. Yeh, Hsin-Yi Tsai, Keith Sklower, Shiuh-Pyng Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, Chia-Wei Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong:
SWOON: A Testbed for Secure Wireless Overlay Networks. CSET 2008 - 2007
- [j11]Li Zhuang, J. D. Tygar, Rachna Dhamija:
Injecting Heterogeneity Through Protocol Randomization. Int. J. Netw. Secur. 4(1): 45-58 (2007) - [c42]Chih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan-Kai Yang, Chi-Lung Chiang:
Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags. APWeb/WAIM Workshops 2007: 634-643 - [c41]Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner:
Dynamic pharming attacks and locked same-origin policies for web browsers. CCS 2007: 58-71 - [c40]Marco Barreno, Alvaro A. Cárdenas, J. Doug Tygar:
Optimal ROC Curve for a Combination of Classifiers. NIPS 2007: 57-64 - 2006
- [c39]Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar:
Can machine learning be secure? AsiaCCS 2006: 16-25 - [c38]Rachna Dhamija, J. D. Tygar, Marti A. Hearst:
Why phishing works. CHI 2006: 581-590 - 2005
- [c37]Li Zhuang, Feng Zhou, J. D. Tygar:
Keyboard acoustic emanations revisited. CCS 2005: 373-382 - [c36]Monica Chew, J. D. Tygar:
Collaborative Filtering CAPTCHAs. HIP 2005: 66-81 - [c35]Rachna Dhamija, J. D. Tygar:
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. HIP 2005: 127-141 - [c34]J. D. Tygar:
When Computer Security Crashes into Multimedia. ISM 2005: 2 - [c33]Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng:
Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 - [c32]Rachna Dhamija, J. Doug Tygar:
The battle against phishing: Dynamic Security Skins. SOUPS 2005: 77-88 - [i1]Adrian Perrig, Dawn Song, Ran Canetti, J. D. Tygar, Bob Briscoe:
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction. RFC 4082: 1-22 (2005) - 2004
- [j10]Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, Wes Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) - [c31]Monica Chew, J. D. Tygar:
Image Recognition CAPTCHAs. ISC 2004: 268-279 - [c30]Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar:
Distillation Codes and Applications to DoS Resistant Multicast Authentication. NDSS 2004 - [c29]Umesh Shankar, Monica Chew, J. D. Tygar:
Side Effects Are Not Sufficient to Authenticate Software. USENIX Security Symposium 2004: 89-102 - 2003
- [b1]Adrian Perrig, J. Doug Tygar:
Secure broadcast communication in wired and wireless networks. Springer 2003, ISBN 978-0-7923-7650-7, pp. I-XIX, 1-214 - 2002
- [j9]Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David E. Culler:
SPINS: Security Protocols for Sensor Networks. Wirel. Networks 8(5): 521-534 (2002) - [c28]J. D. Tygar:
Privacy in Sensor Webs and Distributed Information Systems. ISSS 2002: 84-95 - [c27]Dawn Xiaodong Song, J. D. Tygar, David Zuckerman:
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks. S&P 2002: 258-270 - 2001
- [c26]Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar:
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170 - [c25]Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar:
SPINS: security protocols for sensor netowrks. MobiCom 2001: 189-199 - [c24]Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar:
Efficient and Secure Source Authentication for Multicast. NDSS 2001 - [c23]Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar:
ELK, A New Protocol for Efficient Large-Group Key Distribution. S&P 2001: 247-262 - 2000
- [c22]Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
Efficient Authentication and Signing of Multicast Streams over Lossy Channels. S&P 2000: 56-73
1990 – 1999
- 1999
- [c21]J. D. Tygar:
Open Problems in Electronic Commerce. PODS 1999: 101 - [c20]Alma Whitten, J. Doug Tygar:
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. USENIX Security Symposium 1999 - 1998
- [c19]Michael Harkavy, J. Doug Tygar, Hiroaki Kikuchi:
Electronic Auctions with Private Bids. USENIX Workshop on Electronic Commerce 1998 - [c18]J. D. Tygar:
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce. VLDB 1998: 1-12 - 1997
- [c17]J. D. Tygar:
Limits of Microtransaction Systems. NGITS 1997 - 1996
- [j8]Nevin Heintze, J. D. Tygar:
A Model for Secure Protocols and Their Compositions. IEEE Trans. Software Eng. 22(1): 16-30 (1996) - [c16]J. D. Tygar, Bennet S. Yee, Nevin Heintze:
Cryptographic Postage Indicia. ASIAN 1996: 378-391 - [c15]J. D. Tygar:
Atomicity in Electronic Commerce. PODC 1996: 8-26 - 1995
- [j7]Catherine C. McGeoch, J. D. Tygar:
Optimal Sampling Strategies for Quicksort. Random Struct. Algorithms 7(4): 287-300 (1995) - [j6]Marvin A. Sirbu, J. Doug Tygar:
NetBill: an Internet commerce system optimized for network-delivered services. IEEE Wirel. Commun. 2(4): 34-39 (1995) - [c14]Marvin A. Sirbu, J. D. Tygar:
NetBill: An Internet Commerce System Optimized for Network Delivered Services. COMPCON 1995: 20-25 - [c13]Sean W. Smith, David B. Johnson, J. D. Tygar:
Completely Asynchronous Optimistic Recovery with Minimal Rollbacks. FTCS 1995: 361-370 - [c12]Chris Clifton, Peter Gemmel, Ed Means, Matt J. Merges, J. D. Tygar:
How are We Going to Pay for This? Fee-for-Service in Distributed Systems: Research and Policy Issues (Panel). ICDCS 1995: 344-348 - [c11]L. Jean Camp, Marvin A. Sirbu, J. Doug Tygar:
Token and Notational Money in Electronic Commerce. USENIX Workshop on Electronic Commerce 1995 - 1994
- [j5]Allan Heydon, J. D. Tygar:
Specifying and Checking UNIX Security Constraints. Comput. Syst. 7(1): 91-112 (1994) - [j4]John H. Reif, J. D. Tygar, Akitoshi Yoshida:
Computability and Complexity of Ray Tracing. Discret. Comput. Geom. 11: 265-287 (1994) - [j3]L. Jean Camp, J. D. Tygar:
Providing Auditing While Protecting Privacy. Inf. Soc. 10(1): 59-71 (1994) - [c10]Nevin Heintze, J. Doug Tygar:
A model for secure protocols and their compositions. S&P 1994: 2-13 - 1993
- [c9]Randal E. Bryant, J. D. Tygar, Lawrence P. Huang:
Geometric characterization of series-parallel variable resistor networks. ISCAS 1993: 2678-2681 - 1990
- [j2]Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski:
Miró: Visual Specification of Security. IEEE Trans. Software Eng. 16(10): 1185-1197 (1990) - [c8]John H. Reif, J. D. Tygar, Akitoshi Yoshida:
The Computability and Complexity of Optical Beam Tracing. FOCS 1990: 106-114
1980 – 1989
- 1989
- [c7]Michael O. Rabin, J. D. Tygar:
ITOSS: An Integrated Toolkit For Operating System Security. FODO 1989: 1-15 - [c6]Allan Heydon, Mark W. Maimone, J. D. Tygar, Jeannette M. Wing, Amy Moormann Zaremski:
Constraining Pictures with Pictures. IFIP Congress 1989: 157-162 - [c5]Allan Heydon, Mark W. Maimone, J. Doug Tygar, Jeannette M. Wing, Amy Moormann Zaremski:
Micro tools. VL 1989: 86-91 - 1988
- [j1]John H. Reif, J. D. Tygar:
Efficient Parallel Pseudorandom Number Generation. SIAM J. Comput. 17(2): 404-411 (1988) - [c4]Mark W. Maimone, J. Doug Tygar, Jeannette M. Wing:
Miro semantics for security. VL 1988: 45-51 - 1987
- [c3]Maurice Herlihy, J. D. Tygar:
How to Make Replicated Data Secure. CRYPTO 1987: 379-391 - 1985
- [c2]John H. Reif, J. D. Tygar:
Efficient Parallel Pseudo-Random Number Generation. CRYPTO 1985: 433-446 - [c1]J. Doug Tygar, Ron Ellickson:
Efficient netlist comparison using hierarchy and randomization. DAC 1985: 702-708
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint