| 51 |
Automated Crowdturfing Attacks and Defenses in Online Review Systems
Yuanshun Yao, Bimal Viswanath, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
168 |
8 years ago |
| 52 |
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Changyu Dong, Yilei Wang, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
168 |
8 years ago |
| 53 |
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Panagiotis Kintis, Najmeh Miramirkhani, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
162 |
8 years ago |
| 54 |
Robust Watermarking of Neural Network with Exponential Weighting
Ryota Namba, Jun Sakuma
|
👻
Ghosted
|
cs.CR
|
157 |
7 years ago |
| 55 |
Locally Private Graph Neural Networks
Sina Sajadmanesh, Daniel Gatica-Perez
|
👻
Ghosted
|
cs.LG
|
156 |
5 years ago |
| 56 |
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects
Sazzadur Rahaman, Ya Xiao, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
156 |
7 years ago |
| 57 |
A software approach to defeating side channels in last-level caches
Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang
|
👻
Ghosted
|
cs.CR
|
153 |
10 years ago |
| 58 |
DECO: Liberating Web Data Using Decentralized Oracles for TLS
Fan Zhang, Sai Krishna Deepak Maram, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
152 |
6 years ago |
| 59 |
Detecting Violations of Differential Privacy
Zeyu Ding, Yuxin Wang, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
151 |
7 years ago |
| 60 |
Membership Inference Attacks by Exploiting Loss Trajectory
Yiyong Liu, Zhengyu Zhao, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
151 |
3 years ago |
| 61 |
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems
Tianyu Du, Shouling Ji, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
149 |
7 years ago |
| 62 |
HORNET: High-speed Onion Routing at the Network Layer
Chen Chen, Daniele Enrico Asoni, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
148 |
10 years ago |
| 63 |
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Sharif Abuadbba, Kyuyeon Kim, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
145 |
6 years ago |
| 64 |
Block Oriented Programming: Automating Data-Only Attacks
Kyriakos Ispoglou, Bader AlBassam, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
142 |
7 years ago |
| 65 |
Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
Alena Naiakshina, Anastasia Danilova, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
141 |
8 years ago |
| 66 |
Subpopulation Data Poisoning Attacks
Matthew Jagielski, Giorgio Severi, ... (+2 more)
|
👻
Ghosted
|
cs.LG
|
139 |
5 years ago |
| 67 |
eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
Clara Schneidewind, Ilya Grishchenko, ... (+2 more)
|
👻
Ghosted
|
cs.PL
|
138 |
5 years ago |
| 68 |
Analyzing Information Leakage of Updates to Natural Language Models
Santiago Zanella-Béguelin, Lukas Wutschitz, ... (+6 more)
|
👻
Ghosted
|
cs.LG
|
138 |
6 years ago |
| 69 |
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets
Florian Tramèr, Reza Shokri, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
137 |
4 years ago |
| 70 |
Learning the PE Header, Malware Detection with Minimal Domain Knowledge
Edward Raff, Jared Sylvester, Charles Nicholas
|
👻
Ghosted
|
stat.ML
|
124 |
8 years ago |
| 71 |
Evading Classifiers by Morphing in the Dark
Hung Dang, Yue Huang, Ee-Chien Chang
|
👻
Ghosted
|
cs.CR
|
124 |
8 years ago |
| 72 |
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback
Rui Zhong, Yongheng Chen, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
123 |
5 years ago |
| 73 |
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu, Yangxi Xiang, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
123 |
6 years ago |
| 74 |
Issues Encountered Deploying Differential Privacy
Simson L. Garfinkel, John M. Abowd, Sarah Powazek
|
👻
Ghosted
|
cs.CR
|
122 |
7 years ago |
| 75 |
BDoS: Blockchain Denial of Service
Michael Mirkin, Yan Ji, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
121 |
6 years ago |
| 76 |
Flexible Byzantine Fault Tolerance
Dahlia Malkhi, Kartik Nayak, Ling Ren
|
👻
Ghosted
|
cs.CR
|
121 |
6 years ago |
| 77 |
walk2friends: Inferring Social Links from Mobility Profiles
Michael Backes, Mathias Humbert, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
120 |
8 years ago |
| 78 |
REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data
Xinyun Chen, Wenxiao Wang, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
119 |
6 years ago |
| 79 |
MiniCPS: A toolkit for security research on CPS Networks
Daniele Antonioli, Nils Ole Tippenhauer
|
👻
Ghosted
|
cs.NI
|
117 |
10 years ago |
| 80 |
Private Summation in the Multi-Message Shuffle Model
Borja Balle, James Bell, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
114 |
6 years ago |
| 81 |
Quantitative Verification of Neural Networks And its Security Applications
Teodora Baluta, Shiqi Shen, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
114 |
6 years ago |
| 82 |
Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR)
Sean Sirur, Jason R. C. Nurse, Helena Webb
|
👻
Ghosted
|
cs.CY
|
114 |
7 years ago |
| 83 |
Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage
Xi He, Ashwin Machanavajjhala, ... (+2 more)
|
👻
Ghosted
|
cs.DB
|
111 |
9 years ago |
| 84 |
Runtime Analysis of Whole-System Provenance
Thomas Pasquier, Xueyuan Han, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
108 |
7 years ago |
| 85 |
SIPHON: Towards Scalable High-Interaction Physical Honeypots
Juan Guarnizo, Amit Tambe, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
108 |
9 years ago |
| 86 |
Neither Private Nor Fair: Impact of Data Imbalance on Utility and Fairness in Differential Privacy
Tom Farrand, Fatemehsadat Mireshghallah, ... (+2 more)
|
👻
Ghosted
|
cs.LG
|
107 |
5 years ago |
| 87 |
Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations
Yi Han, Sriharsha Etigowni, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
107 |
8 years ago |
| 88 |
Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency
Yingzi Gao, Yuan Lu, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
106 |
3 years ago |
| 89 |
Malicious Behavior Detection using Windows Audit Logs
Konstantin Berlin, David Slater, Joshua Saxe
|
👻
Ghosted
|
cs.CR
|
101 |
10 years ago |
| 90 |
Impact of integrity attacks on real-time pricing in smart grids
Rui Tan, Varun Badrinath Krishna, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
100 |
10 years ago |
| 91 |
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass
Minxin Du, Xiang Yue, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
100 |
2 years ago |
| 92 |
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security
Yulin Liu, Yuxuan Lu, ... (+4 more)
|
👻
Ghosted
|
econ.GN
|
98 |
4 years ago |
| 93 |
Matryoshka: Fuzzing Deeply Nested Branches
Peng Chen, Jianzhong Liu, Hao Chen
|
👻
Ghosted
|
cs.CR
|
96 |
6 years ago |
| 94 |
Detecting Malicious PowerShell Commands using Deep Neural Networks
Danny Hendler, Shay Kels, Amir Rubin
|
👻
Ghosted
|
cs.CR
|
95 |
7 years ago |
| 95 |
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution
Grant Hernandez, Farhaan Fowze, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
95 |
8 years ago |
| 96 |
Simplicity: A New Language for Blockchains
Russell O'Connor
|
👻
Ghosted
|
cs.PL
|
95 |
8 years ago |
| 97 |
Practical Attacks Against Graph-based Clustering
Yizheng Chen, Yacin Nadji, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
90 |
8 years ago |
| 98 |
Continuous Release of Data Streams under both Centralized and Local Differential Privacy
Tianhao Wang, Joann Qiongna Chen, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
89 |
5 years ago |
| 99 |
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
Huayi Duan, Cong Wang, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
86 |
8 years ago |
| 100 |
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing
Seulbae Kim, Major Liu, ... (+4 more)
|
👻
Ghosted
|
cs.RO
|
85 |
3 years ago |