💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 1, showing 50 papers

# Paper Cause of Death Category Citations Published
1 Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini, David Wagner
👻 Ghosted cs.CR 9.5K 9 years ago
2 Membership Inference Attacks against Machine Learning Models
Reza Shokri, Marco Stronati, ... (+2 more)
👻 Ghosted cs.CR 4.9K 9 years ago
3 Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
Nicolas Papernot, Patrick McDaniel, ... (+3 more)
👻 Ghosted cs.CR 3.2K 10 years ago
4 Spectre Attacks: Exploiting Speculative Execution
Paul Kocher, Daniel Genkin, ... (+8 more)
👻 Ghosted cs.CR 2.4K 8 years ago
5 Exploiting Unintended Feature Leakage in Collaborative Learning
Luca Melis, Congzheng Song, ... (+2 more)
👻 Ghosted cs.CR 1.7K 7 years ago
6 Machine Unlearning
Lucas Bourtoule, Varun Chandrasekaran, ... (+6 more)
👻 Ghosted cs.CR 1.3K 6 years ago
7 Certified Robustness to Adversarial Examples with Differential Privacy
Mathias Lecuyer, Vaggelis Atlidakis, ... (+3 more)
👻 Ghosted stat.ML 995 8 years ago
8 Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
Matthew Jagielski, Alina Oprea, ... (+4 more)
👻 Ghosted cs.CR 855 7 years ago
9 HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen, Michael I. Jordan, Martin J. Wainwright
👻 Ghosted cs.LG 768 6 years ago
10 Angora: Efficient Fuzzing by Principled Search
Peng Chen, Hao Chen
👻 Ghosted cs.CR 598 8 years ago
11 Stealing Hyperparameters in Machine Learning
Binghui Wang, Neil Zhenqiang Gong
👻 Ghosted cs.CR 492 8 years ago
12 Detecting AI Trojans Using Meta Neural Analysis
Xiaojun Xu, Qi Wang, ... (+4 more)
👻 Ghosted cs.AI 372 6 years ago
13 Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
Felix Fischer, Konstantin Böttinger, ... (+5 more)
👻 Ghosted cs.CR 289 8 years ago
14 Differentially Private Model Publishing for Deep Learning
Lei Yu, Ling Liu, ... (+3 more)
👻 Ghosted cs.CR 288 6 years ago
15 Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
Ewa Syta, Iulia Tamas, ... (+7 more)
👻 Ghosted cs.CR 283 11 years ago
16 Riposte: An Anonymous Messaging System Handling Millions of Users
Henry Corrigan-Gibbs, Dan Boneh, David Mazières
👻 Ghosted cs.CR 282 11 years ago
17 Poisoning Web-Scale Training Datasets is Practical
Nicholas Carlini, Matthew Jagielski, ... (+7 more)
👻 Ghosted cs.CR 280 3 years ago
18 Another Flip in the Wall of Rowhammer Defenses
Daniel Gruss, Moritz Lipp, ... (+6 more)
👻 Ghosted cs.CR 278 8 years ago
19 TRRespass: Exploiting the Many Sides of Target Row Refresh
Pietro Frigo, Emanuele Vannacci, ... (+6 more)
👻 Ghosted cs.CR 261 5 years ago
20 High-Frequency Trading on Decentralized On-Chain Exchanges
Liyi Zhou, Kaihua Qin, ... (+3 more)
👻 Ghosted cs.CR 235 5 years ago
21 Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Guangke Chen, Sen Chen, ... (+5 more)
👻 Ghosted eess.AS 228 6 years ago
22 NEUZZ: Efficient Fuzzing with Neural Program Smoothing
Dongdong She, Kexin Pei, ... (+4 more)
👻 Ghosted cs.CR 212 7 years ago
23 Reconstructing Training Data with Informed Adversaries
Borja Balle, Giovanni Cherubin, Jamie Hayes
👻 Ghosted cs.CR 209 4 years ago
24 Do Cookie Banners Respect my Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework
Célestin Matte, Nataliia Bielova, Cristiana Santos
👻 Ghosted cs.CR 203 6 years ago
25 Taxonomy of Attacks on Open-Source Software Supply Chains
Piergiorgio Ladisa, Henrik Plate, ... (+2 more)
👻 Ghosted cs.CR 200 3 years ago
26 Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
Sahar Abdelnabi, Mario Fritz
👻 Ghosted cs.CR 195 5 years ago
27 Ask the Experts: What Should Be on an IoT Privacy and Security Label?
Pardis Emami-Naeini, Yuvraj Agarwal, ... (+2 more)
👻 Ghosted cs.CY 191 6 years ago
28 SoK: Sanitizing for Security
Dokyung Song, Julian Lettner, ... (+5 more)
👻 Ghosted cs.CR 186 7 years ago
29 SAVIOR: Towards Bug-Driven Hybrid Testing
Yaohui Chen, Peng Li, ... (+6 more)
👻 Ghosted cs.SE 183 6 years ago
30 SPECTECTOR: Principled Detection of Speculative Information Flows
Marco Guarnieri, Boris Köpf, ... (+3 more)
👻 Ghosted cs.CR 173 7 years ago
31 OHIE: Blockchain Scaling Made Simple
Haifeng Yu, Ivica Nikolic, ... (+2 more)
👻 Ghosted cs.DC 163 7 years ago
32 Shining Light On Shadow Stacks
Nathan Burow, Xinping Zhang, Mathias Payer
👻 Ghosted cs.CR 162 7 years ago
33 CacheOut: Leaking Data on Intel CPUs via Cache Evictions
Stephan van Schaik, Marina Minkin, ... (+3 more)
👻 Ghosted cs.CR 156 5 years ago
34 Helen: Maliciously Secure Coopetitive Learning for Linear Models
Wenting Zheng, Raluca Ada Popa, ... (+2 more)
👻 Ghosted cs.CR 156 6 years ago
35 The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences
Primal Wijesekera, Arjun Baokar, ... (+5 more)
👻 Ghosted cs.CR 154 9 years ago
36 Redactable Blockchain in the Permissionless Setting
Dominic Deuber, Bernardo Magri, Sri Aravinda Krishnan Thyagarajan
👻 Ghosted cs.CR 150 7 years ago
37 Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing
Stefan Nagy, Matthew Hicks
👻 Ghosted cs.CR 150 7 years ago
38 LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks
Saad Ullah, Mingji Han, ... (+4 more)
👻 Ghosted cs.CR 145 2 years ago
39 SoK: Certified Robustness for Deep Neural Networks
Linyi Li, Tao Xie, Bo Li
👻 Ghosted cs.LG 144 5 years ago
40 Theory and Practice of Finding Eviction Sets
Pepe Vila, Boris Köpf, José Francisco Morales
👻 Ghosted cs.CR 144 7 years ago
41 SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Hadi Abdullah, Kevin Warren, ... (+3 more)
👻 Ghosted cs.CR 143 5 years ago
42 Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors
Umar Iqbal, Steven Englehardt, Zubair Shafiq
👻 Ghosted cs.CR 136 5 years ago
43 SoK: Decentralized Finance (DeFi) Attacks
Liyi Zhou, Xihan Xiong, ... (+8 more)
👻 Ghosted cs.CR 135 3 years ago
44 Lightweight Techniques for Private Heavy Hitters
Dan Boneh, Elette Boyle, ... (+3 more)
👻 Ghosted cs.CR 133 5 years ago
45 Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Yuqi Chen, Christopher M. Poskitt, Jun Sun
👻 Ghosted cs.SE 131 8 years ago
46 VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
Sunbeom So, Myungho Lee, ... (+3 more)
👻 Ghosted cs.PL 128 6 years ago
47 FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information
Xiaoyu Cao, Jinyuan Jia, ... (+2 more)
👻 Ghosted cs.CR 121 3 years ago
48 SoK: Cryptographically Protected Database Search
Benjamin Fuller, Mayank Varia, ... (+7 more)
👻 Ghosted cs.CR 120 9 years ago
49 Manipulation Attacks in Local Differential Privacy
Albert Cheu, Adam Smith, Jonathan Ullman
👻 Ghosted cs.DS 118 6 years ago
50 Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
Lucian Cojocar, Jeremie Kim, ... (+5 more)
👻 Ghosted cs.CR 114 6 years ago