💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 1, showing 50 papers

# Paper Cause of Death Category Citations Published
1 Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
Weilin Xu, David Evans, Yanjun Qi
👻 Ghosted cs.CV 1.5K 8 years ago
2 ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
Ahmed Salem, Yang Zhang, ... (+4 more)
👻 Ghosted cs.CR 1.1K 7 years ago
3 FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
Xiaoyu Cao, Minghong Fang, ... (+2 more)
👻 Ghosted cs.CR 925 5 years ago
4 Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
Yisroel Mirsky, Tomer Doitshman, ... (+2 more)
👻 Ghosted cs.CR 911 8 years ago
5 TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li, Shouling Ji, ... (+3 more)
👻 Ghosted cs.CR 847 7 years ago
6 Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation
Victor Le Pochat, Tom Van Goethem, ... (+3 more)
🌅 Old Age cs.CR 781 7 years ago
7 MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
Enrico Mariconti, Lucky Onwuzurike, ... (+4 more)
👻 Ghosted cs.CR 464 9 years ago
8 UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
Xueyuan Han, Thomas Pasquier, ... (+3 more)
👻 Ghosted cs.CR 380 6 years ago
9 Automated Website Fingerprinting through Deep Learning
Vera Rimmer, Davy Preuveneers, ... (+3 more)
👻 Ghosted cs.CR 368 8 years ago
10 Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
Altaf Shaik, Ravishankar Borgaonkar, ... (+3 more)
👻 Ghosted cs.CR 334 10 years ago
11 Centrally Banked Cryptocurrencies
George Danezis, Sarah Meiklejohn
👻 Ghosted cs.CR 309 10 years ago
12 Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schönherr, Katharina Kohls, ... (+3 more)
👻 Ghosted cs.CR 307 7 years ago
13 Chainspace: A Sharded Smart Contracts Platform
Mustafa Al-Bassam, Alberto Sonnino, ... (+3 more)
👻 Ghosted cs.CR 307 8 years ago
14 Knock Knock, Who's There? Membership Inference on Aggregate Location Data
Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro
👻 Ghosted cs.CR 290 8 years ago
15 Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
Michael Rodler, Wenting Li, ... (+2 more)
👻 Ghosted cs.CR 279 7 years ago
16 Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs
Fei Zuo, Xiaopeng Li, ... (+4 more)
👻 Ghosted cs.SE 258 7 years ago
17 Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
Stefanie Roos, Pedro Moreno-Sanchez, ... (+2 more)
👻 Ghosted cs.CR 241 8 years ago
18 DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
Phillip Rieger, Thien Duc Nguyen, ... (+2 more)
👻 Ghosted cs.CR 212 4 years ago
19 Local and Central Differential Privacy for Robustness and Privacy in Federated Learning
Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro
👻 Ghosted cs.CR 205 5 years ago
20 MasterKey: Automated Jailbreak Across Multiple Large Language Model Chatbots
Gelei Deng, Yi Liu, ... (+7 more)
👻 Ghosted cs.CR 205 2 years ago
21 Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers
Alberto Sonnino, Mustafa Al-Bassam, ... (+3 more)
👻 Ghosted cs.CR 203 8 years ago
22 Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web
Tobias Lauinger, Abdelberi Chaabane, ... (+4 more)
👻 Ghosted cs.CR 181 7 years ago
23 Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Hadi Abdullah, Washington Garcia, ... (+4 more)
👻 Ghosted cs.CR 178 7 years ago
24 POSEIDON: Privacy-Preserving Federated Neural Network Learning
Sinem Sav, Apostolos Pyrgelis, ... (+5 more)
👻 Ghosted cs.CR 174 5 years ago
25 Adversarial Perturbations Against Real-Time Video Classification Systems
Shasha Li, Ajaya Neupane, ... (+5 more)
👻 Ghosted cs.LG 131 7 years ago
26 Efficient Private Statistics with Succinct Sketches
Luca Melis, George Danezis, Emiliano De Cristofaro
👻 Ghosted cs.CR 128 10 years ago
27 When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
Aylin Caliskan, Fabian Yamaguchi, ... (+5 more)
👻 Ghosted cs.CR 121 10 years ago
28 Encrypted DNS --> Privacy? A Traffic Analysis Perspective
Sandra Siby, Marc Juarez, ... (+3 more)
👻 Ghosted cs.CR 120 6 years ago
29 TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication
Ralph Holz, Johanna Amann, ... (+3 more)
👻 Ghosted cs.CR 116 10 years ago
30 Dial One for Scam: A Large-Scale Analysis of Technical Support Scams
Najmeh Miramirkhani, Oleksii Starov, Nick Nikiforakis
👻 Ghosted cs.CR 115 9 years ago
31 Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability
Yu Feng, Osbert Bastani, ... (+3 more)
👻 Ghosted cs.CR 104 9 years ago
32 Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis
Chuanpu Fu, Qi Li, Ke Xu
👻 Ghosted cs.CR 104 3 years ago
33 Locally Differentially Private Frequency Estimation with Consistency
Tianhao Wang, Milan Lopuhaä-Zwakenberg, ... (+3 more)
👻 Ghosted cs.CR 96 6 years ago
34 The Attack of the Clones Against Proof-of-Authority
Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon
👻 Ghosted cs.CR 90 7 years ago
35 ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries
Anastasis Keliris, Michail Maniatakos
👻 Ghosted cs.CR 88 7 years ago
36 SABRE: Protecting Bitcoin against Routing Attacks
Maria Apostolaki, Gian Marti, ... (+2 more)
👻 Ghosted cs.NI 85 7 years ago
37 Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Di Tang, Zhe Zhou, ... (+2 more)
👻 Ghosted cs.CV 78 8 years ago
38 Measuring and mitigating AS-level adversaries against Tor
Rishab Nithyanand, Oleksii Starov, ... (+3 more)
👻 Ghosted cs.CR 75 10 years ago
39 PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation
Ye Liu, Yue Xue, ... (+5 more)
👻 Ghosted cs.SE 74 1 year ago
40 Broken Metre: Attacking Resource Metering in EVM
Daniel Perez, Benjamin Livshits
👻 Ghosted cs.CR 73 6 years ago
41 Privacy-Preserving Shortest Path Computation
David J. Wu, Joe Zimmerman, ... (+2 more)
👻 Ghosted cs.CR 70 10 years ago
42 Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors
Yanzi Zhu, Zhujun Xiao, ... (+5 more)
👻 Ghosted cs.CR 68 7 years ago
43 Detecting Voice Cloning Attacks via Timbre Watermarking
Chang Liu, Jie Zhang, ... (+4 more)
👻 Ghosted cs.SD 64 2 years ago
44 SIBRA: Scalable Internet Bandwidth Reservation Architecture
Cristina Basescu, Raphael M. Reischuk, ... (+6 more)
👻 Ghosted cs.NI 60 10 years ago
45 Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
Haizhong Zheng, Minhui Xue, ... (+5 more)
👻 Ghosted cs.SI 57 8 years ago
46 Practical Traffic Analysis Attacks on Secure Messaging Applications
Alireza Bahramali, Ramin Soltani, ... (+3 more)
👻 Ghosted cs.CR 56 5 years ago
47 Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation
Binghui Wang, Jinyuan Jia, Neil Zhenqiang Gong
👻 Ghosted cs.CR 54 7 years ago
48 Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks
Ziwen Wan, Junjie Shen, ... (+5 more)
👻 Ghosted cs.CR 53 4 years ago
49 SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities
Yuan Xiao, Yinqian Zhang, Radu Teodorescu
👻 Ghosted cs.CR 50 6 years ago
50 YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes
Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand
👻 Ghosted cs.CR 50 7 years ago