💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 2, showing 50 papers

# Paper Cause of Death Category Citations Published
51 The Effect of DNS on Tor's Anonymity
Benjamin Greschbach, Tobias Pulls, ... (+3 more)
👻 Ghosted cs.CR 50 9 years ago
52 Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging
Sebastian Köhler, Richard Baker, ... (+2 more)
👻 Ghosted cs.CR 50 4 years ago
53 NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
Shaofei Li, Feng Dong, ... (+7 more)
👻 Ghosted cs.CR 49 2 years ago
54 How to end password reuse on the web
Ke Coby Wang, Michael K. Reiter
👻 Ghosted cs.CR 47 7 years ago
55 GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line
Yuanda Wang, Hanqing Guo, Qiben Yan
👻 Ghosted cs.CR 47 4 years ago
56 Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel
Zhuoran Liu, Niels Samwel, ... (+5 more)
👻 Ghosted cs.CR 45 5 years ago
57 Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft
Kyungho Joo, Wonsuk Choi, Dong Hoon Lee
👻 Ghosted cs.CR 45 6 years ago
58 FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning
Hossein Fereidooni, Alessandro Pegoraro, ... (+3 more)
👻 Ghosted cs.CR 45 2 years ago
59 Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
Yuqi Qing, Qilei Yin, ... (+7 more)
👻 Ghosted cs.CR 45 2 years ago
60 Private Continual Release of Real-Valued Data Streams
Victor Perrier, Hassan Jameel Asghar, Dali Kaafar
👻 Ghosted cs.CR 44 7 years ago
61 A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services
Hongsheng Hu, Shuo Wang, ... (+6 more)
👻 Ghosted cs.CR 43 2 years ago
62 ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM
Anrin Chakraborti, Radu Sion
👻 Ghosted cs.CR 42 7 years ago
63 HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing
William Blair, Andrea Mambretti, ... (+5 more)
👻 Ghosted cs.CR 41 6 years ago
64 DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting
Tomer Laor, Naif Mehanna, ... (+8 more)
👻 Ghosted cs.CR 40 4 years ago
65 CrowdGuard: Federated Backdoor Detection in Federated Learning
Phillip Rieger, Torsten Krauß, ... (+3 more)
👻 Ghosted cs.CR 39 3 years ago
66 Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data
Kostas Drakonakis, Panagiotis Ilia, ... (+2 more)
👻 Ghosted cs.CY 37 7 years ago
67 Black-box Membership Inference Attacks against Fine-tuned Diffusion Models
Yan Pang, Tianhao Wang
👻 Ghosted cs.CR 37 2 years ago
68 Mysticeti: Reaching the Limits of Latency with Uncertified DAGs
Kushal Babel, Andrey Chursin, ... (+6 more)
👻 Ghosted cs.DC 36 2 years ago
69 Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation
Panagiotis Papadopoulos, Panagiotis Ilia, ... (+4 more)
👻 Ghosted cs.CR 35 7 years ago
70 Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution
Shuo Shao, Yiming Li, ... (+4 more)
👻 Ghosted cs.CR 35 1 year ago
71 Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction
Zitao Chen, Karthik Pattabiraman
👻 Ghosted cs.CR 34 2 years ago
72 DARWIN: Survival of the Fittest Fuzzing Mutators
Patrick Jauernig, Domagoj Jakobovic, ... (+3 more)
👻 Ghosted cs.SE 34 3 years ago
73 LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies
Takami Sato, Yuki Hayakawa, ... (+4 more)
👻 Ghosted cs.CR 33 3 years ago
74 MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing
Gen Zhang, Pengfei Wang, ... (+5 more)
👻 Ghosted cs.CR 32 2 years ago
75 The Philosopher's Stone: Trojaning Plugins of Large Language Models
Tian Dong, Minhui Xue, ... (+6 more)
👻 Ghosted cs.CR 31 2 years ago
76 Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns
Bum Jun Kwon, Virinchi Srinivas, ... (+2 more)
👻 Ghosted cs.CR 30 9 years ago
77 You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
Qiushi Li, Yan Zhang, ... (+3 more)
👻 Ghosted cs.CR 30 2 years ago
78 Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Gorka Abad, Oguzhan Ersoy, ... (+2 more)
👻 Ghosted cs.CR 30 3 years ago
79 POSE: Practical Off-chain Smart Contract Execution
Tommaso Frassetto, Patrick Jauernig, ... (+5 more)
👻 Ghosted cs.CR 30 3 years ago
80 Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection
Aaron Johnson, Rob Jansen, ... (+3 more)
👻 Ghosted cs.CR 29 10 years ago
81 Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks
Avinash Sudhodanan, Soheil Khodayari, Juan Caballero
👻 Ghosted cs.CR 27 6 years ago
82 Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks
Mohd Sabra, Anindya Maiti, Murtuza Jadliwala
👻 Ghosted cs.CR 26 5 years ago
83 On the Resilience of Biometric Authentication Systems against Random Inputs
Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar
👻 Ghosted cs.CR 26 6 years ago
84 Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software
Hugo Lefeuvre, Vlad-Andrei Bădoiu, ... (+4 more)
👻 Ghosted cs.CR 26 3 years ago
85 Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Klim Kireev, Bogdan Kulynych, Carmela Troncoso
👻 Ghosted cs.LG 26 3 years ago
86 BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
Xiao Yi, Yuzhou Fang, ... (+2 more)
👻 Ghosted cs.CR 25 3 years ago
87 Building Embedded Systems Like It's 1996
Ruotong Yu, Francesca Del Nin, ... (+7 more)
👻 Ghosted cs.CR 24 4 years ago
88 D-Box: DMA-enabled Compartmentalization for Embedded Applications
Alejandro Mera, Yi Hui Chen, ... (+3 more)
👻 Ghosted cs.CR 24 4 years ago
89 Content Censorship in the InterPlanetary File System
Srivatsan Sridhar, Onur Ascigil, ... (+6 more)
👻 Ghosted cs.CR 23 2 years ago
90 Snappy: Fast On-chain Payments with Practical Collaterals
Vasilios Mavroudis, Karl Wüst, ... (+3 more)
👻 Ghosted cs.CR 23 6 years ago
91 Fast Actively Secure OT Extension for Short Secrets
Arpita Patra, Pratik Sarkar, Ajith Suresh
👻 Ghosted cs.CR 23 6 years ago
92 Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection
Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi
👻 Ghosted cs.CR 23 3 years ago
93 Towards Plausible Graph Anonymization
Yang Zhang, Mathias Humbert, ... (+4 more)
👻 Ghosted cs.CR 22 8 years ago
94 TextGuard: Provable Defense against Backdoor Attacks on Text Classification
Hengzhi Pei, Jinyuan Jia, ... (+3 more)
💤 Eternal Rest cs.LG 22 2 years ago
95 AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms
Hossein Fereidooni, Jan König, ... (+6 more)
👻 Ghosted cs.CR 22 3 years ago
96 Do We Really Need to Design New Byzantine-robust Aggregation Rules?
Minghong Fang, Seyedsina Nabavirazavi, ... (+4 more)
👻 Ghosted cs.CR 21 1 year ago
97 Fusion: Efficient and Secure Inference Resilient to Malicious Servers
Caiqin Dong, Jian Weng, ... (+6 more)
👻 Ghosted cs.CR 21 3 years ago
98 TEE-aided Write Protection Against Privileged Data Tampering
Lianying Zhao, Mohammad Mannan
👻 Ghosted cs.CR 17 6 years ago
99 CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models
Rui Zeng, Xi Chen, ... (+4 more)
👻 Ghosted cs.CR 17 1 year ago
100 Securing Federated Sensitive Topic Classification against Poisoning Attacks
Tianyue Chu, Alvaro Garcia-Recuero, ... (+3 more)
👻 Ghosted cs.CR 17 4 years ago