💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 2, showing 50 papers

# Paper Cause of Death Category Citations Published
51 Automated Crowdturfing Attacks and Defenses in Online Review Systems
Yuanshun Yao, Bimal Viswanath, ... (+3 more)
👻 Ghosted cs.CR 168 8 years ago
52 Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Changyu Dong, Yilei Wang, ... (+3 more)
👻 Ghosted cs.CR 168 8 years ago
53 Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Panagiotis Kintis, Najmeh Miramirkhani, ... (+6 more)
👻 Ghosted cs.CR 162 8 years ago
54 Robust Watermarking of Neural Network with Exponential Weighting
Ryota Namba, Jun Sakuma
👻 Ghosted cs.CR 157 7 years ago
55 Locally Private Graph Neural Networks
Sina Sajadmanesh, Daniel Gatica-Perez
👻 Ghosted cs.LG 156 5 years ago
56 CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects
Sazzadur Rahaman, Ya Xiao, ... (+7 more)
👻 Ghosted cs.CR 156 7 years ago
57 A software approach to defeating side channels in last-level caches
Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang
👻 Ghosted cs.CR 153 10 years ago
58 DECO: Liberating Web Data Using Decentralized Oracles for TLS
Fan Zhang, Sai Krishna Deepak Maram, ... (+3 more)
👻 Ghosted cs.CR 152 6 years ago
59 Detecting Violations of Differential Privacy
Zeyu Ding, Yuxin Wang, ... (+3 more)
👻 Ghosted cs.CR 151 7 years ago
60 Membership Inference Attacks by Exploiting Loss Trajectory
Yiyong Liu, Zhengyu Zhao, ... (+2 more)
👻 Ghosted cs.CR 151 3 years ago
61 SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems
Tianyu Du, Shouling Ji, ... (+4 more)
👻 Ghosted cs.CR 149 7 years ago
62 HORNET: High-speed Onion Routing at the Network Layer
Chen Chen, Daniele Enrico Asoni, ... (+3 more)
👻 Ghosted cs.CR 148 10 years ago
63 Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Sharif Abuadbba, Kyuyeon Kim, ... (+6 more)
👻 Ghosted cs.CR 145 6 years ago
64 Block Oriented Programming: Automating Data-Only Attacks
Kyriakos Ispoglou, Bader AlBassam, ... (+2 more)
👻 Ghosted cs.CR 142 7 years ago
65 Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
Alena Naiakshina, Anastasia Danilova, ... (+4 more)
👻 Ghosted cs.CR 141 8 years ago
66 Subpopulation Data Poisoning Attacks
Matthew Jagielski, Giorgio Severi, ... (+2 more)
👻 Ghosted cs.LG 139 5 years ago
67 eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
Clara Schneidewind, Ilya Grishchenko, ... (+2 more)
👻 Ghosted cs.PL 138 5 years ago
68 Analyzing Information Leakage of Updates to Natural Language Models
Santiago Zanella-Béguelin, Lukas Wutschitz, ... (+6 more)
👻 Ghosted cs.LG 138 6 years ago
69 Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets
Florian Tramèr, Reza Shokri, ... (+5 more)
👻 Ghosted cs.CR 137 4 years ago
70 Learning the PE Header, Malware Detection with Minimal Domain Knowledge
Edward Raff, Jared Sylvester, Charles Nicholas
👻 Ghosted stat.ML 124 8 years ago
71 Evading Classifiers by Morphing in the Dark
Hung Dang, Yue Huang, Ee-Chien Chang
👻 Ghosted cs.CR 124 8 years ago
72 SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback
Rui Zhong, Yongheng Chen, ... (+4 more)
👻 Ghosted cs.CR 123 5 years ago
73 HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu, Yangxi Xiang, ... (+6 more)
👻 Ghosted cs.CR 123 6 years ago
74 Issues Encountered Deploying Differential Privacy
Simson L. Garfinkel, John M. Abowd, Sarah Powazek
👻 Ghosted cs.CR 122 7 years ago
75 BDoS: Blockchain Denial of Service
Michael Mirkin, Yan Ji, ... (+4 more)
👻 Ghosted cs.CR 121 6 years ago
76 Flexible Byzantine Fault Tolerance
Dahlia Malkhi, Kartik Nayak, Ling Ren
👻 Ghosted cs.CR 121 6 years ago
77 walk2friends: Inferring Social Links from Mobility Profiles
Michael Backes, Mathias Humbert, ... (+2 more)
👻 Ghosted cs.CR 120 8 years ago
78 REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data
Xinyun Chen, Wenxiao Wang, ... (+5 more)
👻 Ghosted cs.CR 119 6 years ago
79 MiniCPS: A toolkit for security research on CPS Networks
Daniele Antonioli, Nils Ole Tippenhauer
👻 Ghosted cs.NI 117 10 years ago
80 Private Summation in the Multi-Message Shuffle Model
Borja Balle, James Bell, ... (+2 more)
👻 Ghosted cs.CR 114 6 years ago
81 Quantitative Verification of Neural Networks And its Security Applications
Teodora Baluta, Shiqi Shen, ... (+3 more)
👻 Ghosted cs.CR 114 6 years ago
82 Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR)
Sean Sirur, Jason R. C. Nurse, Helena Webb
👻 Ghosted cs.CY 114 7 years ago
83 Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage
Xi He, Ashwin Machanavajjhala, ... (+2 more)
👻 Ghosted cs.DB 111 9 years ago
84 Runtime Analysis of Whole-System Provenance
Thomas Pasquier, Xueyuan Han, ... (+6 more)
👻 Ghosted cs.CR 108 7 years ago
85 SIPHON: Towards Scalable High-Interaction Physical Honeypots
Juan Guarnizo, Amit Tambe, ... (+5 more)
👻 Ghosted cs.CR 108 9 years ago
86 Neither Private Nor Fair: Impact of Data Imbalance on Utility and Fairness in Differential Privacy
Tom Farrand, Fatemehsadat Mireshghallah, ... (+2 more)
👻 Ghosted cs.LG 107 5 years ago
87 Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations
Yi Han, Sriharsha Etigowni, ... (+3 more)
👻 Ghosted cs.CR 107 8 years ago
88 Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency
Yingzi Gao, Yuan Lu, ... (+4 more)
👻 Ghosted cs.CR 106 3 years ago
89 Malicious Behavior Detection using Windows Audit Logs
Konstantin Berlin, David Slater, Joshua Saxe
👻 Ghosted cs.CR 101 10 years ago
90 Impact of integrity attacks on real-time pricing in smart grids
Rui Tan, Varun Badrinath Krishna, ... (+2 more)
👻 Ghosted cs.CR 100 10 years ago
91 DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass
Minxin Du, Xiang Yue, ... (+4 more)
👻 Ghosted cs.CR 100 2 years ago
92 Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security
Yulin Liu, Yuxuan Lu, ... (+4 more)
👻 Ghosted econ.GN 98 4 years ago
93 Matryoshka: Fuzzing Deeply Nested Branches
Peng Chen, Jianzhong Liu, Hao Chen
👻 Ghosted cs.CR 96 6 years ago
94 Detecting Malicious PowerShell Commands using Deep Neural Networks
Danny Hendler, Shay Kels, Amir Rubin
👻 Ghosted cs.CR 95 7 years ago
95 FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution
Grant Hernandez, Farhaan Fowze, ... (+3 more)
👻 Ghosted cs.CR 95 8 years ago
96 Simplicity: A New Language for Blockchains
Russell O'Connor
👻 Ghosted cs.PL 95 8 years ago
97 Practical Attacks Against Graph-based Clustering
Yizheng Chen, Yacin Nadji, ... (+5 more)
👻 Ghosted cs.CR 90 8 years ago
98 Continuous Release of Data Streams under both Centralized and Local Differential Privacy
Tianhao Wang, Joann Qiongna Chen, ... (+6 more)
👻 Ghosted cs.CR 89 5 years ago
99 LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
Huayi Duan, Cong Wang, ... (+4 more)
👻 Ghosted cs.CR 86 8 years ago
100 DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing
Seulbae Kim, Major Liu, ... (+4 more)
👻 Ghosted cs.RO 85 3 years ago