💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 1, showing 50 papers

# Paper Cause of Death Category Citations Published
1 Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
Weilin Xu, David Evans, Yanjun Qi
👻 Ghosted cs.CV 1.5K 8 years ago
2 ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
Ahmed Salem, Yang Zhang, ... (+4 more)
👻 Ghosted cs.CR 1.1K 7 years ago
3 FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
Xiaoyu Cao, Minghong Fang, ... (+2 more)
👻 Ghosted cs.CR 925 5 years ago
4 Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
Yisroel Mirsky, Tomer Doitshman, ... (+2 more)
👻 Ghosted cs.CR 911 8 years ago
5 TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li, Shouling Ji, ... (+3 more)
👻 Ghosted cs.CR 847 7 years ago
6 MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
Enrico Mariconti, Lucky Onwuzurike, ... (+4 more)
👻 Ghosted cs.CR 464 9 years ago
7 UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
Xueyuan Han, Thomas Pasquier, ... (+3 more)
👻 Ghosted cs.CR 380 6 years ago
8 Automated Website Fingerprinting through Deep Learning
Vera Rimmer, Davy Preuveneers, ... (+3 more)
👻 Ghosted cs.CR 368 8 years ago
9 Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
Altaf Shaik, Ravishankar Borgaonkar, ... (+3 more)
👻 Ghosted cs.CR 334 10 years ago
10 Centrally Banked Cryptocurrencies
George Danezis, Sarah Meiklejohn
👻 Ghosted cs.CR 309 10 years ago
11 Chainspace: A Sharded Smart Contracts Platform
Mustafa Al-Bassam, Alberto Sonnino, ... (+3 more)
👻 Ghosted cs.CR 307 8 years ago
12 Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schönherr, Katharina Kohls, ... (+3 more)
👻 Ghosted cs.CR 307 7 years ago
13 Knock Knock, Who's There? Membership Inference on Aggregate Location Data
Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro
👻 Ghosted cs.CR 290 8 years ago
14 Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
Michael Rodler, Wenting Li, ... (+2 more)
👻 Ghosted cs.CR 279 7 years ago
15 Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs
Fei Zuo, Xiaopeng Li, ... (+4 more)
👻 Ghosted cs.SE 258 7 years ago
16 Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
Stefanie Roos, Pedro Moreno-Sanchez, ... (+2 more)
👻 Ghosted cs.CR 241 8 years ago
17 DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
Phillip Rieger, Thien Duc Nguyen, ... (+2 more)
👻 Ghosted cs.CR 212 4 years ago
18 Local and Central Differential Privacy for Robustness and Privacy in Federated Learning
Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro
👻 Ghosted cs.CR 205 5 years ago
19 MasterKey: Automated Jailbreak Across Multiple Large Language Model Chatbots
Gelei Deng, Yi Liu, ... (+7 more)
👻 Ghosted cs.CR 205 2 years ago
20 Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers
Alberto Sonnino, Mustafa Al-Bassam, ... (+3 more)
👻 Ghosted cs.CR 203 8 years ago
21 Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web
Tobias Lauinger, Abdelberi Chaabane, ... (+4 more)
👻 Ghosted cs.CR 181 7 years ago
22 Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Hadi Abdullah, Washington Garcia, ... (+4 more)
👻 Ghosted cs.CR 178 7 years ago
23 POSEIDON: Privacy-Preserving Federated Neural Network Learning
Sinem Sav, Apostolos Pyrgelis, ... (+5 more)
👻 Ghosted cs.CR 174 5 years ago
24 Adversarial Perturbations Against Real-Time Video Classification Systems
Shasha Li, Ajaya Neupane, ... (+5 more)
👻 Ghosted cs.LG 131 7 years ago
25 Efficient Private Statistics with Succinct Sketches
Luca Melis, George Danezis, Emiliano De Cristofaro
👻 Ghosted cs.CR 128 10 years ago
26 When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
Aylin Caliskan, Fabian Yamaguchi, ... (+5 more)
👻 Ghosted cs.CR 121 10 years ago
27 Encrypted DNS --> Privacy? A Traffic Analysis Perspective
Sandra Siby, Marc Juarez, ... (+3 more)
👻 Ghosted cs.CR 120 6 years ago
28 TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication
Ralph Holz, Johanna Amann, ... (+3 more)
👻 Ghosted cs.CR 116 10 years ago
29 Dial One for Scam: A Large-Scale Analysis of Technical Support Scams
Najmeh Miramirkhani, Oleksii Starov, Nick Nikiforakis
👻 Ghosted cs.CR 115 9 years ago
30 Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability
Yu Feng, Osbert Bastani, ... (+3 more)
👻 Ghosted cs.CR 104 9 years ago
31 Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis
Chuanpu Fu, Qi Li, Ke Xu
👻 Ghosted cs.CR 104 3 years ago
32 Locally Differentially Private Frequency Estimation with Consistency
Tianhao Wang, Milan Lopuhaä-Zwakenberg, ... (+3 more)
👻 Ghosted cs.CR 96 6 years ago
33 The Attack of the Clones Against Proof-of-Authority
Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon
👻 Ghosted cs.CR 90 7 years ago
34 ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries
Anastasis Keliris, Michail Maniatakos
👻 Ghosted cs.CR 88 7 years ago
35 SABRE: Protecting Bitcoin against Routing Attacks
Maria Apostolaki, Gian Marti, ... (+2 more)
👻 Ghosted cs.NI 85 7 years ago
36 Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Di Tang, Zhe Zhou, ... (+2 more)
👻 Ghosted cs.CV 78 8 years ago
37 Measuring and mitigating AS-level adversaries against Tor
Rishab Nithyanand, Oleksii Starov, ... (+3 more)
👻 Ghosted cs.CR 75 10 years ago
38 PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation
Ye Liu, Yue Xue, ... (+5 more)
👻 Ghosted cs.SE 74 1 year ago
39 Broken Metre: Attacking Resource Metering in EVM
Daniel Perez, Benjamin Livshits
👻 Ghosted cs.CR 73 6 years ago
40 Privacy-Preserving Shortest Path Computation
David J. Wu, Joe Zimmerman, ... (+2 more)
👻 Ghosted cs.CR 70 10 years ago
41 Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors
Yanzi Zhu, Zhujun Xiao, ... (+5 more)
👻 Ghosted cs.CR 68 7 years ago
42 Detecting Voice Cloning Attacks via Timbre Watermarking
Chang Liu, Jie Zhang, ... (+4 more)
👻 Ghosted cs.SD 64 2 years ago
43 SIBRA: Scalable Internet Bandwidth Reservation Architecture
Cristina Basescu, Raphael M. Reischuk, ... (+6 more)
👻 Ghosted cs.NI 60 10 years ago
44 Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
Haizhong Zheng, Minhui Xue, ... (+5 more)
👻 Ghosted cs.SI 57 8 years ago
45 Practical Traffic Analysis Attacks on Secure Messaging Applications
Alireza Bahramali, Ramin Soltani, ... (+3 more)
👻 Ghosted cs.CR 56 5 years ago
46 Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation
Binghui Wang, Jinyuan Jia, Neil Zhenqiang Gong
👻 Ghosted cs.CR 54 7 years ago
47 Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks
Ziwen Wan, Junjie Shen, ... (+5 more)
👻 Ghosted cs.CR 53 4 years ago
48 The Effect of DNS on Tor's Anonymity
Benjamin Greschbach, Tobias Pulls, ... (+3 more)
👻 Ghosted cs.CR 50 9 years ago
49 YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes
Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand
👻 Ghosted cs.CR 50 7 years ago
50 SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities
Yuan Xiao, Yinqian Zhang, Radu Teodorescu
👻 Ghosted cs.CR 50 6 years ago