💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 1, showing 50 papers

# Paper Cause of Death Category Citations Published
1 Extracting Training Data from Large Language Models
Nicholas Carlini, Florian Tramer, ... (+10 more)
👻 Ghosted cs.CR 2.6K 5 years ago
2 Stealing Machine Learning Models via Prediction APIs
Florian Tramèr, Fan Zhang, ... (+3 more)
👻 Ghosted cs.CR 2.0K 9 years ago
3 Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Minghong Fang, Xiaoyu Cao, ... (+2 more)
👻 Ghosted cs.CR 1.4K 6 years ago
4 The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks
Nicholas Carlini, Chang Liu, ... (+3 more)
👻 Ghosted cs.LG 1.3K 8 years ago
5 Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
Eleftherios Kokoris-Kogias, Philipp Jovanovic, ... (+4 more)
👻 Ghosted cs.CR 761 10 years ago
6 Physical Adversarial Examples for Object Detectors
Kevin Eykholt, Ivan Evtimov, ... (+7 more)
👻 Ghosted cs.CR 528 7 years ago
7 Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
Sangho Lee, Ming-Wei Shih, ... (+4 more)
👻 Ghosted cs.CR 528 9 years ago
8 Formal Security Analysis of Neural Networks using Symbolic Intervals
Shiqi Wang, Kexin Pei, ... (+3 more)
👻 Ghosted cs.AI 512 7 years ago
9 DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
Peter Pessl, Daniel Gruss, ... (+3 more)
👻 Ghosted cs.CR 486 10 years ago
10 ARMageddon: Cache Attacks on Mobile Devices
Moritz Lipp, Daniel Gruss, ... (+3 more)
👻 Ghosted cs.CR 446 10 years ago
11 k-fingerprinting: a Robust Scalable Website Fingerprinting Technique
Jamie Hayes, George Danezis
👻 Ghosted cs.CR 446 10 years ago
12 A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella, Jo Van Bulck, ... (+7 more)
👻 Ghosted cs.CR 437 7 years ago
13 High Accuracy and High Fidelity Extraction of Neural Networks
Matthew Jagielski, Nicholas Carlini, ... (+3 more)
👻 Ghosted cs.LG 435 6 years ago
14 TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
Feargus Pendlebury, Fabio Pierazzi, ... (+3 more)
👻 Ghosted cs.CR 423 7 years ago
15 CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Xuejing Yuan, Yuxuan Chen, ... (+8 more)
👻 Ghosted cs.CR 384 8 years ago
16 Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning
Hamza Harkous, Kassem Fawaz, ... (+4 more)
👻 Ghosted cs.CL 380 8 years ago
17 Blind Backdoors in Deep Learning Models
Eugene Bagdasaryan, Vitaly Shmatikov
👻 Ghosted cs.CR 361 5 years ago
18 Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
Octavian Suciu, Radu Mărginean, ... (+3 more)
👻 Ghosted cs.CR 316 8 years ago
19 A New Approach to DDoS Defense using SDN and NFV
Seyed K. Fayaz, Yoshiaki Tobioka, ... (+2 more)
👻 Ghosted cs.NI 310 10 years ago
20 Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference
Klas Leino, Matt Fredrikson
👻 Ghosted cs.LG 309 6 years ago
21 Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures
Jiachen Sun, Yulong Cao, ... (+2 more)
👻 Ghosted cs.CR 287 5 years ago
22 Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
Ahmed Salem, Apratim Bhattacharya, ... (+3 more)
👻 Ghosted cs.CR 286 6 years ago
23 SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
Md Nahid Hossain, Sadegh M Milajerdi, ... (+6 more)
👻 Ghosted cs.CR 278 8 years ago
24 Entangled Watermarks as a Defense against Model Extraction
Hengrui Jia, Christopher A. Choquette-Choo, ... (+2 more)
👻 Ghosted cs.CR 275 6 years ago
25 Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
Mengjia Yan, Christopher Fletcher, Josep Torrellas
👻 Ghosted cs.DC 275 7 years ago
26 Small World with High Risks: A Study of Security Threats in the npm Ecosystem
Markus Zimmermann, Cristian-Alexandru Staicu, ... (+2 more)
👻 Ghosted cs.CR 265 7 years ago
27 Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models
Shawn Shan, Jenna Cryan, ... (+4 more)
👻 Ghosted cs.CR 250 3 years ago
28 Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks
Sanghyun Hong, Pietro Frigo, ... (+3 more)
👻 Ghosted cs.CR 242 6 years ago
29 RAPTOR: Routing Attacks on Privacy in Tor
Yixin Sun, Anne Edmundson, ... (+5 more)
👻 Ghosted cs.NI 240 11 years ago
30 Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection
Di Tang, XiaoFeng Wang, ... (+2 more)
👻 Ghosted cs.CR 234 6 years ago
31 The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
Christof Ferreira Torres, Mathis Steichen, Radu State
👻 Ghosted cs.CR 233 7 years ago
32 Sensitive Information Tracking in Commodity IoT
Z. Berkay Celik, Leonardo Babun, ... (+5 more)
👻 Ghosted cs.CR 232 8 years ago
33 Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack
Mark Russinovich, Ahmed Salem, Ronen Eldan
👻 Ghosted cs.CR 229 1 year ago
34 Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
Nikolaos Karapanos, Claudio Marforio, ... (+2 more)
👻 Ghosted cs.CR 222 11 years ago
35 Stealing Links from Graph Neural Networks
Xinlei He, Jinyuan Jia, ... (+3 more)
👻 Ghosted cs.CR 217 5 years ago
36 Android Permissions Remystified: A Field Study on Contextual Integrity
Primal Wijesekera, Arjun Baokar, ... (+4 more)
👻 Ghosted cs.CR 217 10 years ago
37 BlockSci: Design and applications of a blockchain analysis platform
Harry Kalodner, Steven Goldfeder, ... (+3 more)
🌅 Old Age cs.CR 214 8 years ago
38 CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Yisroel Mirsky, Tom Mahler, ... (+2 more)
🌅 Old Age cs.CR 213 7 years ago
39 The Loopix Anonymity System
Ania Piotrowska, Jamie Hayes, ... (+3 more)
👻 Ghosted cs.CR 206 9 years ago
40 Synthetic Data -- Anonymisation Groundhog Day
Theresa Stadler, Bristena Oprisanu, Carmela Troncoso
👻 Ghosted cs.LG 205 5 years ago
41 DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips
Fan Yao, Adnan Siraj Rakin, Deliang Fan
👻 Ghosted cs.CR 198 5 years ago
42 Interpretable Deep Learning under Fire
Xinyang Zhang, Ningfei Wang, ... (+4 more)
👻 Ghosted cs.CR 189 7 years ago
43 A Placement Vulnerability Study in Multi-tenant Public Clouds
Venkatanathan Varadarajan, Yinqian Zhang, ... (+2 more)
👻 Ghosted cs.CR 188 10 years ago
44 You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
Roei Schuster, Congzheng Song, ... (+2 more)
👻 Ghosted cs.CR 187 5 years ago
45 PowerSpy: Location Tracking using Mobile Device Power Analysis
Yan Michalevsky, Gabi Nakibly, ... (+3 more)
👻 Ghosted cs.CR 187 11 years ago
46 Exploring Connections Between Active Learning and Model Extraction
Varun Chandrasekaran, Kamalika Chaudhuri, ... (+3 more)
👻 Ghosted cs.LG 185 7 years ago
47 AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
Jinyuan Jia, Neil Zhenqiang Gong
👻 Ghosted cs.CR 185 7 years ago
48 Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems
Takeshi Sugawara, Benjamin Cyr, ... (+3 more)
👻 Ghosted cs.CR 184 5 years ago
49 An Empirical Analysis of Anonymity in Zcash
George Kappos, Haaroon Yousaf, ... (+2 more)
👻 Ghosted cs.CR 168 7 years ago
50 PAC it up: Towards Pointer Integrity using ARM Pointer Authentication
Hans Liljestrand, Thomas Nyman, ... (+4 more)
👻 Ghosted cs.CR 161 7 years ago