| 1 |
Extracting Training Data from Large Language Models
Nicholas Carlini, Florian Tramer, ... (+10 more)
|
👻
Ghosted
|
cs.CR
|
2.6K |
5 years ago |
| 2 |
Stealing Machine Learning Models via Prediction APIs
Florian Tramèr, Fan Zhang, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
2.0K |
9 years ago |
| 3 |
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Minghong Fang, Xiaoyu Cao, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
1.4K |
6 years ago |
| 4 |
The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks
Nicholas Carlini, Chang Liu, ... (+3 more)
|
👻
Ghosted
|
cs.LG
|
1.3K |
8 years ago |
| 5 |
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
Eleftherios Kokoris-Kogias, Philipp Jovanovic, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
761 |
10 years ago |
| 6 |
Physical Adversarial Examples for Object Detectors
Kevin Eykholt, Ivan Evtimov, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
528 |
7 years ago |
| 7 |
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
Sangho Lee, Ming-Wei Shih, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
528 |
9 years ago |
| 8 |
Formal Security Analysis of Neural Networks using Symbolic Intervals
Shiqi Wang, Kexin Pei, ... (+3 more)
|
👻
Ghosted
|
cs.AI
|
512 |
7 years ago |
| 9 |
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
Peter Pessl, Daniel Gruss, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
486 |
10 years ago |
| 10 |
ARMageddon: Cache Attacks on Mobile Devices
Moritz Lipp, Daniel Gruss, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
446 |
10 years ago |
| 11 |
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique
Jamie Hayes, George Danezis
|
👻
Ghosted
|
cs.CR
|
446 |
10 years ago |
| 12 |
A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella, Jo Van Bulck, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
437 |
7 years ago |
| 13 |
High Accuracy and High Fidelity Extraction of Neural Networks
Matthew Jagielski, Nicholas Carlini, ... (+3 more)
|
👻
Ghosted
|
cs.LG
|
435 |
6 years ago |
| 14 |
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
Feargus Pendlebury, Fabio Pierazzi, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
423 |
7 years ago |
| 15 |
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Xuejing Yuan, Yuxuan Chen, ... (+8 more)
|
👻
Ghosted
|
cs.CR
|
384 |
8 years ago |
| 16 |
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning
Hamza Harkous, Kassem Fawaz, ... (+4 more)
|
👻
Ghosted
|
cs.CL
|
380 |
8 years ago |
| 17 |
Blind Backdoors in Deep Learning Models
Eugene Bagdasaryan, Vitaly Shmatikov
|
👻
Ghosted
|
cs.CR
|
361 |
5 years ago |
| 18 |
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
Octavian Suciu, Radu Mărginean, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
316 |
8 years ago |
| 19 |
A New Approach to DDoS Defense using SDN and NFV
Seyed K. Fayaz, Yoshiaki Tobioka, ... (+2 more)
|
👻
Ghosted
|
cs.NI
|
310 |
10 years ago |
| 20 |
Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference
Klas Leino, Matt Fredrikson
|
👻
Ghosted
|
cs.LG
|
309 |
6 years ago |
| 21 |
Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures
Jiachen Sun, Yulong Cao, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
287 |
5 years ago |
| 22 |
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
Ahmed Salem, Apratim Bhattacharya, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
286 |
6 years ago |
| 23 |
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
Md Nahid Hossain, Sadegh M Milajerdi, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
278 |
8 years ago |
| 24 |
Entangled Watermarks as a Defense against Model Extraction
Hengrui Jia, Christopher A. Choquette-Choo, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
275 |
6 years ago |
| 25 |
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
Mengjia Yan, Christopher Fletcher, Josep Torrellas
|
👻
Ghosted
|
cs.DC
|
275 |
7 years ago |
| 26 |
Small World with High Risks: A Study of Security Threats in the npm Ecosystem
Markus Zimmermann, Cristian-Alexandru Staicu, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
265 |
7 years ago |
| 27 |
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models
Shawn Shan, Jenna Cryan, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
250 |
3 years ago |
| 28 |
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks
Sanghyun Hong, Pietro Frigo, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
242 |
6 years ago |
| 29 |
RAPTOR: Routing Attacks on Privacy in Tor
Yixin Sun, Anne Edmundson, ... (+5 more)
|
👻
Ghosted
|
cs.NI
|
240 |
11 years ago |
| 30 |
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection
Di Tang, XiaoFeng Wang, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
234 |
6 years ago |
| 31 |
The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
Christof Ferreira Torres, Mathis Steichen, Radu State
|
👻
Ghosted
|
cs.CR
|
233 |
7 years ago |
| 32 |
Sensitive Information Tracking in Commodity IoT
Z. Berkay Celik, Leonardo Babun, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
232 |
8 years ago |
| 33 |
Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack
Mark Russinovich, Ahmed Salem, Ronen Eldan
|
👻
Ghosted
|
cs.CR
|
229 |
1 year ago |
| 34 |
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
Nikolaos Karapanos, Claudio Marforio, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
222 |
11 years ago |
| 35 |
Stealing Links from Graph Neural Networks
Xinlei He, Jinyuan Jia, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
217 |
5 years ago |
| 36 |
Android Permissions Remystified: A Field Study on Contextual Integrity
Primal Wijesekera, Arjun Baokar, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
217 |
10 years ago |
| 37 |
BlockSci: Design and applications of a blockchain analysis platform
Harry Kalodner, Steven Goldfeder, ... (+3 more)
|
🌅
Old Age
|
cs.CR
|
214 |
8 years ago |
| 38 |
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Yisroel Mirsky, Tom Mahler, ... (+2 more)
|
🌅
Old Age
|
cs.CR
|
213 |
7 years ago |
| 39 |
The Loopix Anonymity System
Ania Piotrowska, Jamie Hayes, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
206 |
9 years ago |
| 40 |
Synthetic Data -- Anonymisation Groundhog Day
Theresa Stadler, Bristena Oprisanu, Carmela Troncoso
|
👻
Ghosted
|
cs.LG
|
205 |
5 years ago |
| 41 |
DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips
Fan Yao, Adnan Siraj Rakin, Deliang Fan
|
👻
Ghosted
|
cs.CR
|
198 |
5 years ago |
| 42 |
Interpretable Deep Learning under Fire
Xinyang Zhang, Ningfei Wang, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
189 |
7 years ago |
| 43 |
A Placement Vulnerability Study in Multi-tenant Public Clouds
Venkatanathan Varadarajan, Yinqian Zhang, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
188 |
10 years ago |
| 44 |
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
Roei Schuster, Congzheng Song, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
187 |
5 years ago |
| 45 |
PowerSpy: Location Tracking using Mobile Device Power Analysis
Yan Michalevsky, Gabi Nakibly, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
187 |
11 years ago |
| 46 |
Exploring Connections Between Active Learning and Model Extraction
Varun Chandrasekaran, Kamalika Chaudhuri, ... (+3 more)
|
👻
Ghosted
|
cs.LG
|
185 |
7 years ago |
| 47 |
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
Jinyuan Jia, Neil Zhenqiang Gong
|
👻
Ghosted
|
cs.CR
|
185 |
7 years ago |
| 48 |
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems
Takeshi Sugawara, Benjamin Cyr, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
184 |
5 years ago |
| 49 |
An Empirical Analysis of Anonymity in Zcash
George Kappos, Haaroon Yousaf, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
168 |
7 years ago |
| 50 |
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication
Hans Liljestrand, Thomas Nyman, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
161 |
7 years ago |