| 51 |
The Effect of DNS on Tor's Anonymity
Benjamin Greschbach, Tobias Pulls, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
50 |
9 years ago |
| 52 |
Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging
Sebastian Köhler, Richard Baker, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
50 |
4 years ago |
| 53 |
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
Shaofei Li, Feng Dong, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
49 |
2 years ago |
| 54 |
How to end password reuse on the web
Ke Coby Wang, Michael K. Reiter
|
👻
Ghosted
|
cs.CR
|
47 |
7 years ago |
| 55 |
GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line
Yuanda Wang, Hanqing Guo, Qiben Yan
|
👻
Ghosted
|
cs.CR
|
47 |
4 years ago |
| 56 |
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel
Zhuoran Liu, Niels Samwel, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
45 |
5 years ago |
| 57 |
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft
Kyungho Joo, Wonsuk Choi, Dong Hoon Lee
|
👻
Ghosted
|
cs.CR
|
45 |
6 years ago |
| 58 |
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning
Hossein Fereidooni, Alessandro Pegoraro, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
45 |
2 years ago |
| 59 |
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
Yuqi Qing, Qilei Yin, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
45 |
2 years ago |
| 60 |
Private Continual Release of Real-Valued Data Streams
Victor Perrier, Hassan Jameel Asghar, Dali Kaafar
|
👻
Ghosted
|
cs.CR
|
44 |
7 years ago |
| 61 |
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services
Hongsheng Hu, Shuo Wang, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
43 |
2 years ago |
| 62 |
ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM
Anrin Chakraborti, Radu Sion
|
👻
Ghosted
|
cs.CR
|
42 |
7 years ago |
| 63 |
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing
William Blair, Andrea Mambretti, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
41 |
6 years ago |
| 64 |
DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting
Tomer Laor, Naif Mehanna, ... (+8 more)
|
👻
Ghosted
|
cs.CR
|
40 |
4 years ago |
| 65 |
CrowdGuard: Federated Backdoor Detection in Federated Learning
Phillip Rieger, Torsten Krauß, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
39 |
3 years ago |
| 66 |
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data
Kostas Drakonakis, Panagiotis Ilia, ... (+2 more)
|
👻
Ghosted
|
cs.CY
|
37 |
7 years ago |
| 67 |
Black-box Membership Inference Attacks against Fine-tuned Diffusion Models
Yan Pang, Tianhao Wang
|
👻
Ghosted
|
cs.CR
|
37 |
2 years ago |
| 68 |
Mysticeti: Reaching the Limits of Latency with Uncertified DAGs
Kushal Babel, Andrey Chursin, ... (+6 more)
|
👻
Ghosted
|
cs.DC
|
36 |
2 years ago |
| 69 |
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation
Panagiotis Papadopoulos, Panagiotis Ilia, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
35 |
7 years ago |
| 70 |
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution
Shuo Shao, Yiming Li, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
35 |
1 year ago |
| 71 |
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction
Zitao Chen, Karthik Pattabiraman
|
👻
Ghosted
|
cs.CR
|
34 |
2 years ago |
| 72 |
DARWIN: Survival of the Fittest Fuzzing Mutators
Patrick Jauernig, Domagoj Jakobovic, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
34 |
3 years ago |
| 73 |
LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies
Takami Sato, Yuki Hayakawa, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
33 |
3 years ago |
| 74 |
MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing
Gen Zhang, Pengfei Wang, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
32 |
2 years ago |
| 75 |
The Philosopher's Stone: Trojaning Plugins of Large Language Models
Tian Dong, Minhui Xue, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
31 |
2 years ago |
| 76 |
Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns
Bum Jun Kwon, Virinchi Srinivas, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
30 |
9 years ago |
| 77 |
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
Qiushi Li, Yan Zhang, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
30 |
2 years ago |
| 78 |
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Gorka Abad, Oguzhan Ersoy, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
30 |
3 years ago |
| 79 |
POSE: Practical Off-chain Smart Contract Execution
Tommaso Frassetto, Patrick Jauernig, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
30 |
3 years ago |
| 80 |
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection
Aaron Johnson, Rob Jansen, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
29 |
10 years ago |
| 81 |
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks
Avinash Sudhodanan, Soheil Khodayari, Juan Caballero
|
👻
Ghosted
|
cs.CR
|
27 |
6 years ago |
| 82 |
Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks
Mohd Sabra, Anindya Maiti, Murtuza Jadliwala
|
👻
Ghosted
|
cs.CR
|
26 |
5 years ago |
| 83 |
On the Resilience of Biometric Authentication Systems against Random Inputs
Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar
|
👻
Ghosted
|
cs.CR
|
26 |
6 years ago |
| 84 |
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software
Hugo Lefeuvre, Vlad-Andrei Bădoiu, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
26 |
3 years ago |
| 85 |
Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Klim Kireev, Bogdan Kulynych, Carmela Troncoso
|
👻
Ghosted
|
cs.LG
|
26 |
3 years ago |
| 86 |
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
Xiao Yi, Yuzhou Fang, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
25 |
3 years ago |
| 87 |
Building Embedded Systems Like It's 1996
Ruotong Yu, Francesca Del Nin, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
24 |
4 years ago |
| 88 |
D-Box: DMA-enabled Compartmentalization for Embedded Applications
Alejandro Mera, Yi Hui Chen, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
24 |
4 years ago |
| 89 |
Content Censorship in the InterPlanetary File System
Srivatsan Sridhar, Onur Ascigil, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
23 |
2 years ago |
| 90 |
Snappy: Fast On-chain Payments with Practical Collaterals
Vasilios Mavroudis, Karl Wüst, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
23 |
6 years ago |
| 91 |
Fast Actively Secure OT Extension for Short Secrets
Arpita Patra, Pratik Sarkar, Ajith Suresh
|
👻
Ghosted
|
cs.CR
|
23 |
6 years ago |
| 92 |
Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection
Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi
|
👻
Ghosted
|
cs.CR
|
23 |
3 years ago |
| 93 |
Towards Plausible Graph Anonymization
Yang Zhang, Mathias Humbert, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
22 |
8 years ago |
| 94 |
TextGuard: Provable Defense against Backdoor Attacks on Text Classification
Hengzhi Pei, Jinyuan Jia, ... (+3 more)
|
💤
Eternal Rest
|
cs.LG
|
22 |
2 years ago |
| 95 |
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms
Hossein Fereidooni, Jan König, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
22 |
3 years ago |
| 96 |
Do We Really Need to Design New Byzantine-robust Aggregation Rules?
Minghong Fang, Seyedsina Nabavirazavi, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
21 |
1 year ago |
| 97 |
Fusion: Efficient and Secure Inference Resilient to Malicious Servers
Caiqin Dong, Jian Weng, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
21 |
3 years ago |
| 98 |
TEE-aided Write Protection Against Privileged Data Tampering
Lianying Zhao, Mohammad Mannan
|
👻
Ghosted
|
cs.CR
|
17 |
6 years ago |
| 99 |
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models
Rui Zeng, Xi Chen, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
17 |
1 year ago |
| 100 |
Securing Federated Sensitive Topic Classification against Poisoning Attacks
Tianyue Chu, Alvaro Garcia-Recuero, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
17 |
4 years ago |