default search action
Ryan Sheatsley
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i18]Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick D. McDaniel:
Characterizing the Modification Space of Signature IDS Rules. CoRR abs/2402.09644 (2024) - [i17]Quinn Burke, Ryan Sheatsley, Rachel King, Michael Swift, Patrick D. McDaniel:
Cloud Storage Integrity at Scale: A Case for Dynamic Hash Trees. CoRR abs/2405.03830 (2024) - [i16]Rachel King, Quinn Burke, Yohan Beugin, Blaine Hoak, Kunyang Li, Eric Pauley, Ryan Sheatsley, Patrick D. McDaniel:
ParTEETor: A System for Partial Deployments of TEEs within Tor. CoRR abs/2408.14646 (2024) - 2023
- [c9]Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick D. McDaniel:
Characterizing the Modification Space of Signature IDS Rules. MILCOM 2023: 536-541 - [c8]Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick D. McDaniel:
The Space of Adversarial Strategies. USENIX Security Symposium 2023: 3745-3761 - [i15]Quinn Burke, Yohan Beugin, Blaine Hoak, Rachel King, Eric Pauley, Ryan Sheatsley, Mingli Yu, Ting He, Thomas La Porta, Patrick D. McDaniel:
Securing Cloud File Systems using Shielded Execution. CoRR abs/2305.18639 (2023) - [i14]Alban Héon, Ryan Sheatsley, Quinn Burke, Blaine Hoak, Eric Pauley, Yohan Beugin, Patrick D. McDaniel:
Systematic Evaluation of Geolocation Privacy Mechanisms. CoRR abs/2309.06263 (2023) - 2022
- [j2]Ryan Sheatsley, Nicolas Papernot, Michael J. Weisman, Gunjan Verma, Patrick D. McDaniel:
Adversarial examples for network intrusion detection systems. J. Comput. Secur. 30(5): 727-752 (2022) - [j1]Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Building a Privacy-Preserving Smart Camera System. Proc. Priv. Enhancing Technol. 2022(2): 25-46 (2022) - [c7]Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick D. McDaniel:
Measuring and Mitigating the Risk of IP Reuse on Public Clouds. SP 2022: 558-575 - [i13]Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Building a Privacy-Preserving Smart Camera System. CoRR abs/2201.09338 (2022) - [i12]Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel:
HoneyModels: Machine Learning Honeypots. CoRR abs/2202.10309 (2022) - [i11]Ryan Sheatsley, Matthew Durbin, Azaree Lintereur, Patrick D. McDaniel:
Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations. CoRR abs/2202.10387 (2022) - [i10]Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick D. McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth V. Krishnamurthy:
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN. CoRR abs/2203.06694 (2022) - [i9]Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick D. McDaniel:
Measuring and Mitigating the Risk of IP Reuse on Public Clouds. CoRR abs/2204.05122 (2022) - [i8]Kyle Domico, Ryan Sheatsley, Yohan Beugin, Quinn Burke, Patrick D. McDaniel:
A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting. CoRR abs/2204.05780 (2022) - [i7]Valentin Vie, Ryan Sheatsley, Sophia Beyda, Sushrut Shringarputale, Kevin S. Chan, Trent Jaeger, Patrick D. McDaniel:
Adversarial Plannning. CoRR abs/2205.00566 (2022) - [i6]Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick D. McDaniel:
Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices. CoRR abs/2208.09776 (2022) - [i5]Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick D. McDaniel:
The Space of Adversarial Strategies. CoRR abs/2209.04521 (2022) - [i4]Eric Pauley, Kyle Domico, Blaine Hoak, Ryan Sheatsley, Quinn Burke, Yohan Beugin, Patrick D. McDaniel:
EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale. CoRR abs/2210.14999 (2022) - 2021
- [c6]Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick D. McDaniel:
On the Robustness of Domain Constraints. CCS 2021: 495-515 - [c5]Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel:
HoneyModels: Machine Learning Honeypots. MILCOM 2021: 886-891 - [i3]Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick D. McDaniel:
On the Robustness of Domain Constraints. CoRR abs/2105.08619 (2021) - 2020
- [i2]Ryan Sheatsley, Nicolas Papernot, Michael J. Weisman, Gunjan Verma, Patrick D. McDaniel:
Adversarial Examples in Constrained Domains. CoRR abs/2011.01183 (2020)
2010 – 2019
- 2019
- [c4]Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac:
Curie: Policy-based Secure Data Exchange. CODASPY 2019: 121-132 - [c3]Raquel Alvarez, Jake Levenson, Ryan Sheatsley, Patrick D. McDaniel:
Application Transiency: Towards a Fair Trade of Personal Information for Application Services. SecureComm (2) 2019: 47-66 - 2018
- [c2]Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami:
Detection under Privileged Information. AsiaCCS 2018: 199-206 - [c1]Gunjan Verma, Ertugrul N. Ciftcioglu, Ryan Sheatsley, Kevin S. Chan, Lisa Scott:
Network Traffic Obfuscation: An Adversarial Machine Learning Approach. MILCOM 2018: 1-6 - 2017
- [i1]Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick D. McDaniel:
Curie: Policy-based Secure Data Exchange. CoRR abs/1702.08342 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint