What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yevgeniy Vorobeychik
Google Scholar
10
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Preference Poisoning Attacks on Reward Model Learning.
Junlin Wu
Jiongxiao Wang
Chaowei Xiao
Chenguang Wang
Ning Zhang
Yevgeniy Vorobeychik
2025
journals/tifs
Robust Graph Contrastive Learning With Information Restoration.
Yulin Zhu
Xing Ai
Yevgeniy Vorobeychik
Kai Zhou
2024
conf/sp
Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks.
Junlin Wu
Hussein Sibai
Yevgeniy Vorobeychik
2022
conf/ccs
When Evil Calls: Targeted Adversarial Voice over IP Network.
Han Liu
Zhiyuan Yu
Mingming Zha
XiaoFeng Wang
William Yeoh
Yevgeniy Vorobeychik
Ning Zhang
2020
conf/ccs
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Ren Pang
Hua Shen
Xinyang Zhang
Shouling Ji
Yevgeniy Vorobeychik
Xiapu Luo
Alex X. Liu
Ting Wang
2019
journals/compsec
Detection and mitigation of attacks on transportation networks as a multi-stage security game.
Aron Laszka
Waseem Abbas
Yevgeniy Vorobeychik
Xenofon D. Koutsoukos
2019
conf/uss
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Liang Tong
Bo Li
Chen Hajaj
Chaowei Xiao
Ning Zhang
Yevgeniy Vorobeychik
2017
conf/ccs
Robust Linear Regression Against Training Data Poisoning.
Chang Liu
Bo Li
Yevgeniy Vorobeychik
Alina Oprea
2017
conf/host
Using computational game theory to guide verification and security in hardware designs.
Andrew M. Smith
Jackson R. Mayo
Vivian Kammler
Robert C. Armstrong
Yevgeniy Vorobeychik
2015
conf/ccs
Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems.
Waseem Abbas
Aron Laszka
Yevgeniy Vorobeychik
Xenofon D. Koutsoukos
Coauthors
Alex X. Liu
(1)
Alina Oprea
(1)
Andrew M. Smith
(1)
Aron Laszka
(2)
Bo Li
(2)
Chang Liu
(1)
Chaowei Xiao
(2)
Chen Hajaj
(1)
Chenguang Wang
(1)
Han Liu
(1)
Hua Shen
(1)
Hussein Sibai
(1)
Jackson R. Mayo
(1)
Jiongxiao Wang
(1)
Junlin Wu
(2)
Kai Zhou
(1)
Liang Tong
(1)
Mingming Zha
(1)
Ning Zhang
(3)
Ren Pang
(1)
Robert C. Armstrong
(1)
Shouling Ji
(1)
Ting Wang
(1)
Vivian Kammler
(1)
Waseem Abbas
(2)
William Yeoh
(1)
Xenofon D. Koutsoukos
(2)
XiaoFeng Wang
(1)
Xiapu Luo
(1)
Xing Ai
(1)
Xinyang Zhang
(1)
Yevgeniy Vorobeychik
(10)
Yulin Zhu
(1)
Zhiyuan Yu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to