| 1 |
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
Weilin Xu, David Evans, Yanjun Qi
|
👻
Ghosted
|
cs.CV
|
1.5K |
8 years ago |
| 2 |
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
Ahmed Salem, Yang Zhang, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
1.1K |
7 years ago |
| 3 |
FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
Xiaoyu Cao, Minghong Fang, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
925 |
5 years ago |
| 4 |
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
Yisroel Mirsky, Tomer Doitshman, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
911 |
8 years ago |
| 5 |
TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li, Shouling Ji, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
847 |
7 years ago |
| 6 |
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation
Victor Le Pochat, Tom Van Goethem, ... (+3 more)
|
🌅
Old Age
|
cs.CR
|
781 |
7 years ago |
| 7 |
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
Enrico Mariconti, Lucky Onwuzurike, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
464 |
9 years ago |
| 8 |
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
Xueyuan Han, Thomas Pasquier, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
380 |
6 years ago |
| 9 |
Automated Website Fingerprinting through Deep Learning
Vera Rimmer, Davy Preuveneers, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
368 |
8 years ago |
| 10 |
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
Altaf Shaik, Ravishankar Borgaonkar, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
334 |
10 years ago |
| 11 |
Centrally Banked Cryptocurrencies
George Danezis, Sarah Meiklejohn
|
👻
Ghosted
|
cs.CR
|
309 |
10 years ago |
| 12 |
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schönherr, Katharina Kohls, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
307 |
7 years ago |
| 13 |
Chainspace: A Sharded Smart Contracts Platform
Mustafa Al-Bassam, Alberto Sonnino, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
307 |
8 years ago |
| 14 |
Knock Knock, Who's There? Membership Inference on Aggregate Location Data
Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro
|
👻
Ghosted
|
cs.CR
|
290 |
8 years ago |
| 15 |
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
Michael Rodler, Wenting Li, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
279 |
7 years ago |
| 16 |
Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs
Fei Zuo, Xiaopeng Li, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
258 |
7 years ago |
| 17 |
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
Stefanie Roos, Pedro Moreno-Sanchez, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
241 |
8 years ago |
| 18 |
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
Phillip Rieger, Thien Duc Nguyen, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
212 |
4 years ago |
| 19 |
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning
Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro
|
👻
Ghosted
|
cs.CR
|
205 |
5 years ago |
| 20 |
MasterKey: Automated Jailbreak Across Multiple Large Language Model Chatbots
Gelei Deng, Yi Liu, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
205 |
2 years ago |
| 21 |
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers
Alberto Sonnino, Mustafa Al-Bassam, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
203 |
8 years ago |
| 22 |
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web
Tobias Lauinger, Abdelberi Chaabane, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
181 |
7 years ago |
| 23 |
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Hadi Abdullah, Washington Garcia, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
178 |
7 years ago |
| 24 |
POSEIDON: Privacy-Preserving Federated Neural Network Learning
Sinem Sav, Apostolos Pyrgelis, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
174 |
5 years ago |
| 25 |
Adversarial Perturbations Against Real-Time Video Classification Systems
Shasha Li, Ajaya Neupane, ... (+5 more)
|
👻
Ghosted
|
cs.LG
|
131 |
7 years ago |
| 26 |
Efficient Private Statistics with Succinct Sketches
Luca Melis, George Danezis, Emiliano De Cristofaro
|
👻
Ghosted
|
cs.CR
|
128 |
10 years ago |
| 27 |
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
Aylin Caliskan, Fabian Yamaguchi, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
121 |
10 years ago |
| 28 |
Encrypted DNS --> Privacy? A Traffic Analysis Perspective
Sandra Siby, Marc Juarez, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
120 |
6 years ago |
| 29 |
TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication
Ralph Holz, Johanna Amann, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
116 |
10 years ago |
| 30 |
Dial One for Scam: A Large-Scale Analysis of Technical Support Scams
Najmeh Miramirkhani, Oleksii Starov, Nick Nikiforakis
|
👻
Ghosted
|
cs.CR
|
115 |
9 years ago |
| 31 |
Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability
Yu Feng, Osbert Bastani, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
104 |
9 years ago |
| 32 |
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis
Chuanpu Fu, Qi Li, Ke Xu
|
👻
Ghosted
|
cs.CR
|
104 |
3 years ago |
| 33 |
Locally Differentially Private Frequency Estimation with Consistency
Tianhao Wang, Milan Lopuhaä-Zwakenberg, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
96 |
6 years ago |
| 34 |
The Attack of the Clones Against Proof-of-Authority
Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon
|
👻
Ghosted
|
cs.CR
|
90 |
7 years ago |
| 35 |
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries
Anastasis Keliris, Michail Maniatakos
|
👻
Ghosted
|
cs.CR
|
88 |
7 years ago |
| 36 |
SABRE: Protecting Bitcoin against Routing Attacks
Maria Apostolaki, Gian Marti, ... (+2 more)
|
👻
Ghosted
|
cs.NI
|
85 |
7 years ago |
| 37 |
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
Di Tang, Zhe Zhou, ... (+2 more)
|
👻
Ghosted
|
cs.CV
|
78 |
8 years ago |
| 38 |
Measuring and mitigating AS-level adversaries against Tor
Rishab Nithyanand, Oleksii Starov, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
75 |
10 years ago |
| 39 |
PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation
Ye Liu, Yue Xue, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
74 |
1 year ago |
| 40 |
Broken Metre: Attacking Resource Metering in EVM
Daniel Perez, Benjamin Livshits
|
👻
Ghosted
|
cs.CR
|
73 |
6 years ago |
| 41 |
Privacy-Preserving Shortest Path Computation
David J. Wu, Joe Zimmerman, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
70 |
10 years ago |
| 42 |
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors
Yanzi Zhu, Zhujun Xiao, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
68 |
7 years ago |
| 43 |
Detecting Voice Cloning Attacks via Timbre Watermarking
Chang Liu, Jie Zhang, ... (+4 more)
|
👻
Ghosted
|
cs.SD
|
64 |
2 years ago |
| 44 |
SIBRA: Scalable Internet Bandwidth Reservation Architecture
Cristina Basescu, Raphael M. Reischuk, ... (+6 more)
|
👻
Ghosted
|
cs.NI
|
60 |
10 years ago |
| 45 |
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
Haizhong Zheng, Minhui Xue, ... (+5 more)
|
👻
Ghosted
|
cs.SI
|
57 |
8 years ago |
| 46 |
Practical Traffic Analysis Attacks on Secure Messaging Applications
Alireza Bahramali, Ramin Soltani, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
56 |
5 years ago |
| 47 |
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation
Binghui Wang, Jinyuan Jia, Neil Zhenqiang Gong
|
👻
Ghosted
|
cs.CR
|
54 |
7 years ago |
| 48 |
Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks
Ziwen Wan, Junjie Shen, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
53 |
4 years ago |
| 49 |
SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities
Yuan Xiao, Yinqian Zhang, Radu Teodorescu
|
👻
Ghosted
|
cs.CR
|
50 |
6 years ago |
| 50 |
YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes
Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand
|
👻
Ghosted
|
cs.CR
|
50 |
7 years ago |