| 1 |
Deep Learning with Differential Privacy
Martín Abadi, Andy Chu, ... (+5 more)
|
👻
Ghosted
|
stat.ML
|
7.2K |
9 years ago |
| 2 |
Practical Black-Box Attacks against Machine Learning
Nicolas Papernot, Patrick McDaniel, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
3.9K |
10 years ago |
| 3 |
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models
Pin-Yu Chen, Huan Zhang, ... (+3 more)
|
👻
Ghosted
|
stat.ML
|
2.1K |
8 years ago |
| 4 |
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
Nicholas Carlini, David Wagner
|
👻
Ghosted
|
cs.LG
|
2.0K |
8 years ago |
| 5 |
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz
|
👻
Ghosted
|
cs.CR
|
1.5K |
9 years ago |
| 6 |
MagNet: a Two-Pronged Defense against Adversarial Examples
Dongyu Meng, Hao Chen
|
👻
Ghosted
|
cs.CR
|
1.3K |
8 years ago |
| 7 |
Securify: Practical Security Analysis of Smart Contracts
Petar Tsankov, Andrei Dan, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
1.1K |
7 years ago |
| 8 |
DolphinAtack: Inaudible Voice Commands
Guoming Zhang, Chen Yan, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
741 |
8 years ago |
| 9 |
Evaluating Fuzz Testing
George Klees, Andrew Ruef, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
719 |
7 years ago |
| 10 |
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization
Luis Muñoz-González, Battista Biggio, ... (+5 more)
|
👻
Ghosted
|
cs.LG
|
676 |
8 years ago |
| 11 |
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
Xiaojun Xu, Chang Liu, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
658 |
8 years ago |
| 12 |
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving
Yulong Cao, Chaowei Xiao, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
605 |
6 years ago |
| 13 |
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Payap Sirinam, Mohsen Imani, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
577 |
8 years ago |
| 14 |
Machine Learning Models that Remember Too Much
Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov
|
👻
Ghosted
|
cs.CR
|
570 |
8 years ago |
| 15 |
Machine Learning with Membership Privacy using Adversarial Regularization
Milad Nasr, Reza Shokri, Amir Houmansadr
|
👻
Ghosted
|
stat.ML
|
531 |
7 years ago |
| 16 |
ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz, Moritz Lipp, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
459 |
6 years ago |
| 17 |
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
Jinyuan Jia, Ahmed Salem, ... (+3 more)
|
🌅
Old Age
|
cs.CR
|
447 |
6 years ago |
| 18 |
A Formal Analysis of 5G Authentication
David Basin, Jannik Dreier, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
419 |
7 years ago |
| 19 |
(Un)informed Consent: Studying GDPR Consent Notices in the Field
Christine Utz, Martin Degeling, ... (+3 more)
|
👻
Ghosted
|
cs.HC
|
410 |
6 years ago |
| 20 |
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Wenhao Wang, Guoxing Chen, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
396 |
8 years ago |
| 21 |
Information Leakage in Embedding Models
Congzheng Song, Ananth Raghunathan
|
👻
Ghosted
|
cs.LG
|
338 |
5 years ago |
| 22 |
Efficient Defenses Against Adversarial Attacks
Valentina Zantedeschi, Maria-Irina Nicolae, Ambrish Rawat
|
👻
Ghosted
|
cs.LG
|
312 |
8 years ago |
| 23 |
HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning
Runhua Xu, Nathalie Baracaldo, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
305 |
6 years ago |
| 24 |
Detecting Cyberattacks in Industrial Control Systems Using Convolutional Neural Networks
Moshe Kravchik, Asaf Shabtai
|
👻
Ghosted
|
cs.CR
|
305 |
7 years ago |
| 25 |
Membership Leakage in Label-Only Exposures
Zheng Li, Yang Zhang
|
👻
Ghosted
|
cs.LG
|
297 |
5 years ago |
| 26 |
C-FLAT: Control-FLow ATtestation for Embedded Systems Software
Tigist Abera, N. Asokan, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
296 |
9 years ago |
| 27 |
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
Sadegh M. Milajerdi, Birhanu Eshete, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
293 |
6 years ago |
| 28 |
Do Users Write More Insecure Code with AI Assistants?
Neil Perry, Megha Srivastava, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
288 |
3 years ago |
| 29 |
ret2spec: Speculative Execution Using Return Stack Buffers
Giorgi Maisuradze, Christian Rossow
|
👻
Ghosted
|
cs.CR
|
282 |
7 years ago |
| 30 |
Privacy Risks of Securing Machine Learning Models against Adversarial Examples
Liwei Song, Reza Shokri, Prateek Mittal
|
🌅
Old Age
|
stat.ML
|
281 |
6 years ago |
| 31 |
Bullshark: DAG BFT Protocols Made Practical
Alexander Spiegelman, Neil Giridharan, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
266 |
4 years ago |
| 32 |
SMoTherSpectre: exploiting speculative execution through port contention
Atri Bhattacharyya, Alexandra Sandulescu, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
265 |
7 years ago |
| 33 |
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Yujin Kwon, Dohyun Kim, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
244 |
8 years ago |
| 34 |
Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information
Yi Zeng, Minzhou Pan, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
234 |
3 years ago |
| 35 |
QUOTIENT: Two-Party Secure Neural Network Training and Prediction
Nitin Agrawal, Ali Shahin Shamsabadi, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
233 |
6 years ago |
| 36 |
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Andrei Costin, Apostolis Zarras, Aurélien Francillon
|
👻
Ghosted
|
cs.CR
|
226 |
10 years ago |
| 37 |
Differential Privacy as a Mutual Information Constraint
Paul Cuff, Lanqing Yu
|
👻
Ghosted
|
cs.IT
|
220 |
9 years ago |
| 38 |
A Comprehensive Formal Security Analysis of OAuth 2.0
Daniel Fett, Ralf Kuesters, Guido Schmitz
|
👻
Ghosted
|
cs.CR
|
219 |
10 years ago |
| 39 |
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation
Han Qiu, Yi Zeng, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
216 |
5 years ago |
| 40 |
Viden: Attacker Identification on In-Vehicle Networks
Kyong-Tak Cho, Kang Shin
|
👻
Ghosted
|
cs.CR
|
214 |
8 years ago |
| 41 |
DeepDGA: Adversarially-Tuned Domain Generation and Detection
Hyrum S. Anderson, Jonathan Woodbridge, Bobby Filar
|
👻
Ghosted
|
cs.CR
|
214 |
9 years ago |
| 42 |
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
Zeyang Sha, Zheng Li, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
211 |
3 years ago |
| 43 |
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities
Theofilos Petsios, Jason Zhao, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
206 |
8 years ago |
| 44 |
Model-Reuse Attacks on Deep Learning Systems
Yujie Ji, Xinyang Zhang, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
195 |
7 years ago |
| 45 |
IoTSense: Behavioral Fingerprinting of IoT Devices
Bruhadeshwar Bezawada, Maalvika Bachani, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
189 |
7 years ago |
| 46 |
zkBridge: Trustless Cross-chain Bridges Made Practical
Tiancheng Xie, Jiaheng Zhang, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
187 |
3 years ago |
| 47 |
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
Milad Nasr, Alireza Bahramali, Amir Houmansadr
|
👻
Ghosted
|
cs.CR
|
179 |
7 years ago |
| 48 |
Tiresias: Predicting Security Events Through Deep Learning
Yun Shen, Enrico Mariconti, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
177 |
6 years ago |
| 49 |
New Directions in Automated Traffic Analysis
Jordan Holland, Paul Schmitt, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
171 |
5 years ago |
| 50 |
Attacking Graph-based Classification via Manipulating the Graph Structure
Binghui Wang, Neil Zhenqiang Gong
|
👻
Ghosted
|
cs.CR
|
169 |
7 years ago |