💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 1, showing 50 papers

# Paper Cause of Death Category Citations Published
1 Deep Learning with Differential Privacy
Martín Abadi, Andy Chu, ... (+5 more)
👻 Ghosted stat.ML 7.2K 9 years ago
2 Practical Black-Box Attacks against Machine Learning
Nicolas Papernot, Patrick McDaniel, ... (+4 more)
👻 Ghosted cs.CR 3.9K 10 years ago
3 ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models
Pin-Yu Chen, Huan Zhang, ... (+3 more)
👻 Ghosted stat.ML 2.1K 8 years ago
4 Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
Nicholas Carlini, David Wagner
👻 Ghosted cs.LG 2.0K 8 years ago
5 Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz
👻 Ghosted cs.CR 1.5K 9 years ago
6 MagNet: a Two-Pronged Defense against Adversarial Examples
Dongyu Meng, Hao Chen
👻 Ghosted cs.CR 1.3K 8 years ago
7 Securify: Practical Security Analysis of Smart Contracts
Petar Tsankov, Andrei Dan, ... (+4 more)
👻 Ghosted cs.CR 1.1K 7 years ago
8 DolphinAtack: Inaudible Voice Commands
Guoming Zhang, Chen Yan, ... (+4 more)
👻 Ghosted cs.CR 741 8 years ago
9 Evaluating Fuzz Testing
George Klees, Andrew Ruef, ... (+3 more)
👻 Ghosted cs.CR 719 7 years ago
10 Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization
Luis Muñoz-González, Battista Biggio, ... (+5 more)
👻 Ghosted cs.LG 676 8 years ago
11 Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
Xiaojun Xu, Chang Liu, ... (+4 more)
👻 Ghosted cs.CR 658 8 years ago
12 Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving
Yulong Cao, Chaowei Xiao, ... (+7 more)
👻 Ghosted cs.CR 605 6 years ago
13 Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Payap Sirinam, Mohsen Imani, ... (+2 more)
👻 Ghosted cs.CR 577 8 years ago
14 Machine Learning Models that Remember Too Much
Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov
👻 Ghosted cs.CR 570 8 years ago
15 Machine Learning with Membership Privacy using Adversarial Regularization
Milad Nasr, Reza Shokri, Amir Houmansadr
👻 Ghosted stat.ML 531 7 years ago
16 ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz, Moritz Lipp, ... (+5 more)
👻 Ghosted cs.CR 459 6 years ago
17 MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
Jinyuan Jia, Ahmed Salem, ... (+3 more)
🌅 Old Age cs.CR 447 6 years ago
18 A Formal Analysis of 5G Authentication
David Basin, Jannik Dreier, ... (+4 more)
👻 Ghosted cs.CR 419 7 years ago
19 (Un)informed Consent: Studying GDPR Consent Notices in the Field
Christine Utz, Martin Degeling, ... (+3 more)
👻 Ghosted cs.HC 410 6 years ago
20 Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Wenhao Wang, Guoxing Chen, ... (+6 more)
👻 Ghosted cs.CR 396 8 years ago
21 Information Leakage in Embedding Models
Congzheng Song, Ananth Raghunathan
👻 Ghosted cs.LG 338 5 years ago
22 Efficient Defenses Against Adversarial Attacks
Valentina Zantedeschi, Maria-Irina Nicolae, Ambrish Rawat
👻 Ghosted cs.LG 312 8 years ago
23 HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning
Runhua Xu, Nathalie Baracaldo, ... (+3 more)
👻 Ghosted cs.CR 305 6 years ago
24 Detecting Cyberattacks in Industrial Control Systems Using Convolutional Neural Networks
Moshe Kravchik, Asaf Shabtai
👻 Ghosted cs.CR 305 7 years ago
25 Membership Leakage in Label-Only Exposures
Zheng Li, Yang Zhang
👻 Ghosted cs.LG 297 5 years ago
26 C-FLAT: Control-FLow ATtestation for Embedded Systems Software
Tigist Abera, N. Asokan, ... (+6 more)
👻 Ghosted cs.CR 296 9 years ago
27 POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
Sadegh M. Milajerdi, Birhanu Eshete, ... (+2 more)
👻 Ghosted cs.CR 293 6 years ago
28 Do Users Write More Insecure Code with AI Assistants?
Neil Perry, Megha Srivastava, ... (+2 more)
👻 Ghosted cs.CR 288 3 years ago
29 ret2spec: Speculative Execution Using Return Stack Buffers
Giorgi Maisuradze, Christian Rossow
👻 Ghosted cs.CR 282 7 years ago
30 Privacy Risks of Securing Machine Learning Models against Adversarial Examples
Liwei Song, Reza Shokri, Prateek Mittal
🌅 Old Age stat.ML 281 6 years ago
31 Bullshark: DAG BFT Protocols Made Practical
Alexander Spiegelman, Neil Giridharan, ... (+2 more)
👻 Ghosted cs.CR 266 4 years ago
32 SMoTherSpectre: exploiting speculative execution through port contention
Atri Bhattacharyya, Alexandra Sandulescu, ... (+5 more)
👻 Ghosted cs.CR 265 7 years ago
33 Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Yujin Kwon, Dohyun Kim, ... (+3 more)
👻 Ghosted cs.CR 244 8 years ago
34 Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information
Yi Zeng, Minzhou Pan, ... (+4 more)
👻 Ghosted cs.CR 234 3 years ago
35 QUOTIENT: Two-Party Secure Neural Network Training and Prediction
Nitin Agrawal, Ali Shahin Shamsabadi, ... (+2 more)
👻 Ghosted cs.CR 233 6 years ago
36 Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Andrei Costin, Apostolis Zarras, Aurélien Francillon
👻 Ghosted cs.CR 226 10 years ago
37 Differential Privacy as a Mutual Information Constraint
Paul Cuff, Lanqing Yu
👻 Ghosted cs.IT 220 9 years ago
38 A Comprehensive Formal Security Analysis of OAuth 2.0
Daniel Fett, Ralf Kuesters, Guido Schmitz
👻 Ghosted cs.CR 219 10 years ago
39 DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation
Han Qiu, Yi Zeng, ... (+4 more)
👻 Ghosted cs.CR 216 5 years ago
40 Viden: Attacker Identification on In-Vehicle Networks
Kyong-Tak Cho, Kang Shin
👻 Ghosted cs.CR 214 8 years ago
41 DeepDGA: Adversarially-Tuned Domain Generation and Detection
Hyrum S. Anderson, Jonathan Woodbridge, Bobby Filar
👻 Ghosted cs.CR 214 9 years ago
42 DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
Zeyang Sha, Zheng Li, ... (+2 more)
👻 Ghosted cs.CR 211 3 years ago
43 SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities
Theofilos Petsios, Jason Zhao, ... (+2 more)
👻 Ghosted cs.CR 206 8 years ago
44 Model-Reuse Attacks on Deep Learning Systems
Yujie Ji, Xinyang Zhang, ... (+3 more)
👻 Ghosted cs.CR 195 7 years ago
45 IoTSense: Behavioral Fingerprinting of IoT Devices
Bruhadeshwar Bezawada, Maalvika Bachani, ... (+4 more)
👻 Ghosted cs.CR 189 7 years ago
46 zkBridge: Trustless Cross-chain Bridges Made Practical
Tiancheng Xie, Jiaheng Zhang, ... (+6 more)
👻 Ghosted cs.CR 187 3 years ago
47 DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
Milad Nasr, Alireza Bahramali, Amir Houmansadr
👻 Ghosted cs.CR 179 7 years ago
48 Tiresias: Predicting Security Events Through Deep Learning
Yun Shen, Enrico Mariconti, ... (+2 more)
👻 Ghosted cs.CR 177 6 years ago
49 New Directions in Automated Traffic Analysis
Jordan Holland, Paul Schmitt, ... (+2 more)
👻 Ghosted cs.CR 171 5 years ago
50 Attacking Graph-based Classification via Manipulating the Graph Structure
Binghui Wang, Neil Zhenqiang Gong
👻 Ghosted cs.CR 169 7 years ago