| 1 |
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini, David Wagner
|
👻
Ghosted
|
cs.CR
|
9.5K |
9 years ago |
| 2 |
Membership Inference Attacks against Machine Learning Models
Reza Shokri, Marco Stronati, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
4.9K |
9 years ago |
| 3 |
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
Nicolas Papernot, Patrick McDaniel, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
3.2K |
10 years ago |
| 4 |
Spectre Attacks: Exploiting Speculative Execution
Paul Kocher, Daniel Genkin, ... (+8 more)
|
👻
Ghosted
|
cs.CR
|
2.4K |
8 years ago |
| 5 |
Exploiting Unintended Feature Leakage in Collaborative Learning
Luca Melis, Congzheng Song, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
1.7K |
7 years ago |
| 6 |
Machine Unlearning
Lucas Bourtoule, Varun Chandrasekaran, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
1.3K |
6 years ago |
| 7 |
Certified Robustness to Adversarial Examples with Differential Privacy
Mathias Lecuyer, Vaggelis Atlidakis, ... (+3 more)
|
👻
Ghosted
|
stat.ML
|
995 |
8 years ago |
| 8 |
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
Matthew Jagielski, Alina Oprea, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
855 |
7 years ago |
| 9 |
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
Jianbo Chen, Michael I. Jordan, Martin J. Wainwright
|
👻
Ghosted
|
cs.LG
|
768 |
6 years ago |
| 10 |
Angora: Efficient Fuzzing by Principled Search
Peng Chen, Hao Chen
|
👻
Ghosted
|
cs.CR
|
598 |
8 years ago |
| 11 |
Stealing Hyperparameters in Machine Learning
Binghui Wang, Neil Zhenqiang Gong
|
👻
Ghosted
|
cs.CR
|
492 |
8 years ago |
| 12 |
Detecting AI Trojans Using Meta Neural Analysis
Xiaojun Xu, Qi Wang, ... (+4 more)
|
👻
Ghosted
|
cs.AI
|
372 |
6 years ago |
| 13 |
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
Felix Fischer, Konstantin Böttinger, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
289 |
8 years ago |
| 14 |
Differentially Private Model Publishing for Deep Learning
Lei Yu, Ling Liu, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
288 |
6 years ago |
| 15 |
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
Ewa Syta, Iulia Tamas, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
283 |
11 years ago |
| 16 |
Riposte: An Anonymous Messaging System Handling Millions of Users
Henry Corrigan-Gibbs, Dan Boneh, David Mazières
|
👻
Ghosted
|
cs.CR
|
282 |
11 years ago |
| 17 |
Poisoning Web-Scale Training Datasets is Practical
Nicholas Carlini, Matthew Jagielski, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
280 |
3 years ago |
| 18 |
Another Flip in the Wall of Rowhammer Defenses
Daniel Gruss, Moritz Lipp, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
278 |
8 years ago |
| 19 |
TRRespass: Exploiting the Many Sides of Target Row Refresh
Pietro Frigo, Emanuele Vannacci, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
261 |
5 years ago |
| 20 |
High-Frequency Trading on Decentralized On-Chain Exchanges
Liyi Zhou, Kaihua Qin, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
235 |
5 years ago |
| 21 |
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Guangke Chen, Sen Chen, ... (+5 more)
|
👻
Ghosted
|
eess.AS
|
228 |
6 years ago |
| 22 |
NEUZZ: Efficient Fuzzing with Neural Program Smoothing
Dongdong She, Kexin Pei, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
212 |
7 years ago |
| 23 |
Reconstructing Training Data with Informed Adversaries
Borja Balle, Giovanni Cherubin, Jamie Hayes
|
👻
Ghosted
|
cs.CR
|
209 |
4 years ago |
| 24 |
Do Cookie Banners Respect my Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework
Célestin Matte, Nataliia Bielova, Cristiana Santos
|
👻
Ghosted
|
cs.CR
|
203 |
6 years ago |
| 25 |
Taxonomy of Attacks on Open-Source Software Supply Chains
Piergiorgio Ladisa, Henrik Plate, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
200 |
3 years ago |
| 26 |
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
Sahar Abdelnabi, Mario Fritz
|
👻
Ghosted
|
cs.CR
|
195 |
5 years ago |
| 27 |
Ask the Experts: What Should Be on an IoT Privacy and Security Label?
Pardis Emami-Naeini, Yuvraj Agarwal, ... (+2 more)
|
👻
Ghosted
|
cs.CY
|
191 |
6 years ago |
| 28 |
SoK: Sanitizing for Security
Dokyung Song, Julian Lettner, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
186 |
7 years ago |
| 29 |
SAVIOR: Towards Bug-Driven Hybrid Testing
Yaohui Chen, Peng Li, ... (+6 more)
|
👻
Ghosted
|
cs.SE
|
183 |
6 years ago |
| 30 |
SPECTECTOR: Principled Detection of Speculative Information Flows
Marco Guarnieri, Boris Köpf, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
173 |
7 years ago |
| 31 |
OHIE: Blockchain Scaling Made Simple
Haifeng Yu, Ivica Nikolic, ... (+2 more)
|
👻
Ghosted
|
cs.DC
|
163 |
7 years ago |
| 32 |
Shining Light On Shadow Stacks
Nathan Burow, Xinping Zhang, Mathias Payer
|
👻
Ghosted
|
cs.CR
|
162 |
7 years ago |
| 33 |
CacheOut: Leaking Data on Intel CPUs via Cache Evictions
Stephan van Schaik, Marina Minkin, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
156 |
5 years ago |
| 34 |
Helen: Maliciously Secure Coopetitive Learning for Linear Models
Wenting Zheng, Raluca Ada Popa, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
156 |
6 years ago |
| 35 |
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences
Primal Wijesekera, Arjun Baokar, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
154 |
9 years ago |
| 36 |
Redactable Blockchain in the Permissionless Setting
Dominic Deuber, Bernardo Magri, Sri Aravinda Krishnan Thyagarajan
|
👻
Ghosted
|
cs.CR
|
150 |
7 years ago |
| 37 |
Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing
Stefan Nagy, Matthew Hicks
|
👻
Ghosted
|
cs.CR
|
150 |
7 years ago |
| 38 |
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks
Saad Ullah, Mingji Han, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
145 |
2 years ago |
| 39 |
SoK: Certified Robustness for Deep Neural Networks
Linyi Li, Tao Xie, Bo Li
|
👻
Ghosted
|
cs.LG
|
144 |
5 years ago |
| 40 |
Theory and Practice of Finding Eviction Sets
Pepe Vila, Boris Köpf, José Francisco Morales
|
👻
Ghosted
|
cs.CR
|
144 |
7 years ago |
| 41 |
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Hadi Abdullah, Kevin Warren, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
143 |
5 years ago |
| 42 |
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors
Umar Iqbal, Steven Englehardt, Zubair Shafiq
|
👻
Ghosted
|
cs.CR
|
136 |
5 years ago |
| 43 |
SoK: Decentralized Finance (DeFi) Attacks
Liyi Zhou, Xihan Xiong, ... (+8 more)
|
👻
Ghosted
|
cs.CR
|
135 |
3 years ago |
| 44 |
Lightweight Techniques for Private Heavy Hitters
Dan Boneh, Elette Boyle, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
133 |
5 years ago |
| 45 |
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Yuqi Chen, Christopher M. Poskitt, Jun Sun
|
👻
Ghosted
|
cs.SE
|
131 |
8 years ago |
| 46 |
VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
Sunbeom So, Myungho Lee, ... (+3 more)
|
👻
Ghosted
|
cs.PL
|
128 |
6 years ago |
| 47 |
FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information
Xiaoyu Cao, Jinyuan Jia, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
121 |
3 years ago |
| 48 |
SoK: Cryptographically Protected Database Search
Benjamin Fuller, Mayank Varia, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
120 |
9 years ago |
| 49 |
Manipulation Attacks in Local Differential Privacy
Albert Cheu, Adam Smith, Jonathan Ullman
|
👻
Ghosted
|
cs.DS
|
118 |
6 years ago |
| 50 |
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
Lucian Cojocar, Jeremie Kim, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
114 |
6 years ago |