暂无分享,去创建一个
Ben Y. Zhao | Haitao Zheng | Arjun Nitin Bhagoji | Shawn Shan | A. Bhagoji | Haitao Zheng | Shawn Shan
[1] Dimitris S. Papailiopoulos,et al. A Geometric Perspective on the Transferability of Adversarial Directions , 2018, AISTATS.
[2] Tao Wang,et al. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.
[3] L. Davis,et al. Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors , 2019, ECCV.
[4] Yoshua Bengio,et al. How transferable are features in deep neural networks? , 2014, NIPS.
[5] Klaus Wehrle,et al. TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting , 2020, CCS.
[6] Muni Sreenivas Pydi,et al. Adversarial Risk via Optimal Transport and Optimal Couplings , 2019, IEEE Transactions on Information Theory.
[7] George Danezis,et al. Statistical Disclosure Attacks , 2003, SEC.
[8] Shuai Li,et al. Measuring Information Leakage in Website Fingerprinting Attacks and Defenses , 2017, CCS.
[9] Matthew K. Wright,et al. An analysis of the statistical disclosure attack and receiver-bound cover , 2011, Comput. Secur..
[10] Suman Jana,et al. Towards Understanding Fast Adversarial Training , 2020, ArXiv.
[11] Chong Xiang,et al. PatchGuard: Provable Defense against Adversarial Patches Using Masks on Small Receptive Fields , 2020, ArXiv.
[12] Ananthram Swami,et al. Crafting adversarial input sequences for recurrent neural networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[13] Patrick D. McDaniel,et al. Adversarial Examples for Malware Detection , 2017, ESORICS.
[14] Jinfeng Yi,et al. EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples , 2017, AAAI.
[15] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[16] Sameer Singh,et al. Universal Adversarial Triggers for Attacking and Analyzing NLP , 2019, EMNLP.
[17] Wanxiang Che,et al. Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency , 2019, ACL.
[18] Aleksander Madry,et al. Adversarial Examples Are Not Bugs, They Are Features , 2019, NeurIPS.
[19] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[20] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[21] Daniel Cullina,et al. Lower Bounds on Adversarial Robustness from Optimal Transport , 2019, NeurIPS.
[22] Mohsen Imani,et al. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning , 2018, CCS.
[23] Giovanni Cherubin,et al. Website Fingerprinting Defenses at the Application Layer , 2017, Proc. Priv. Enhancing Technol..
[24] Ryan R. Curtin,et al. Detecting Adversarial Samples from Artifacts , 2017, ArXiv.
[25] Mohammad Saidur Rahman,et al. Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning , 2019, CCS.
[26] Patrick Thiran,et al. Protecting against Website Fingerprinting with Multihoming , 2020, Proc. Priv. Enhancing Technol..
[27] Nicholas Hopper,et al. RegulaTOR: A Powerful Website Fingerprinting Defense , 2020, ArXiv.
[28] Klaus Wehrle,et al. Website Fingerprinting at Internet Scale , 2016, NDSS.
[29] Tom Goldstein,et al. Certified Defenses for Adversarial Patches , 2020, ICLR.
[30] Jon Lee. A First Course in Combinatorial Optimization , 2004 .
[31] Dejing Dou,et al. HotFlip: White-Box Adversarial Examples for Text Classification , 2017, ACL.
[32] Micah Adler,et al. Passive-Logging Attacks Against Anonymous Communications Systems , 2008, TSEC.
[33] Bernt Schiele,et al. Adversarial Training against Location-Optimized Adversarial Patches , 2020, ECCV Workshops.
[34] Timothy M. Hospedales,et al. Measuring the Transferability of Adversarial Examples , 2019, ArXiv.
[35] Mun Choon Chan,et al. Website Fingerprinting and Identification Using Ordered Feature Sequences , 2010, ESORICS.
[36] Giovanni Cherubin. Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses , 2017, Proc. Priv. Enhancing Technol..
[37] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[38] Quan Z. Sheng,et al. Adversarial Attacks on Deep Learning Models in Natural Language Processing: A Survey , 2019 .
[39] Michael McCoyd,et al. Minority Reports Defense: Defending Against Adversarial Patches , 2020, ACNS Workshops.
[40] Claudia Eckert,et al. Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[41] J. Zico Kolter,et al. Fast is better than free: Revisiting adversarial training , 2020, ICLR.
[42] Vitaly Shmatikov,et al. Blind Backdoors in Deep Learning Models , 2020, USENIX Security Symposium.
[43] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[44] Salman Khan,et al. Local Gradients Smoothing: Defense Against Localized Adversarial Attacks , 2018, 2019 IEEE Winter Conference on Applications of Computer Vision (WACV).
[45] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.
[46] Xiang Cai,et al. Glove: A Bespoke Website Fingerprinting Defense , 2014, WPES.
[47] Tudor Dumitras,et al. When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks , 2018, USENIX Security Symposium.
[48] Fabio Roli,et al. Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks , 2018, USENIX Security Symposium.
[49] Xiang Cai,et al. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense , 2014, WPES.
[50] Wouter Joosen,et al. Automated Website Fingerprinting through Deep Learning , 2017, NDSS.
[51] David Wagner,et al. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods , 2017, AISec@CCS.
[52] Mohsen Imani,et al. Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces , 2019, IEEE Transactions on Information Forensics and Security.
[53] Jamie Hayes,et al. On Visible Adversarial Perturbations & Digital Watermarking , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[54] Amir Houmansadr,et al. Blind Adversarial Network Perturbations , 2020, ArXiv.
[55] Mohsen Imani,et al. Adv-DWF: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces , 2019, ArXiv.
[56] Micah Adler,et al. The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.
[57] Mike Perry,et al. Toward an Efficient Website Fingerprinting Defense , 2015, ESORICS.
[58] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[59] George Danezis,et al. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique , 2015, USENIX Security Symposium.
[60] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[61] Xiaosen Wang,et al. Natural Language Adversarial Attacks and Defenses in Word Level , 2019, ArXiv.
[62] Shigeki Goto,et al. Fingerprinting Attack on Tor Anonymity using Deep Learning , 2016 .
[63] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[64] Jiajun Gong,et al. Zero-delay Lightweight Defenses against Website Fingerprinting , 2020, USENIX Security Symposium.
[65] Jian Liu,et al. Defense Against Universal Adversarial Perturbations , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[66] Dawn Song,et al. Physical Adversarial Examples for Object Detectors , 2018, WOOT @ USENIX Security Symposium.
[67] Shai Ben-David,et al. Understanding Machine Learning: From Theory to Algorithms , 2014 .
[68] Tao Wang,et al. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks , 2017, USENIX Security Symposium.
[69] Gang Xiong,et al. WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial Learning , 2020, 2020 IEEE Symposium on Computers and Communications (ISCC).
[70] Scott E. Coull,et al. Exploring Adversarial Examples in Malware Detection , 2018, 2019 IEEE Security and Privacy Workshops (SPW).
[71] Dan Boneh,et al. Adversarial Training and Robustness for Multiple Perturbations , 2019, NeurIPS.
[72] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[73] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[74] Duen Horng Chau,et al. ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector , 2018, ECML/PKDD.
[75] Hannes Federrath,et al. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.
[76] Mohammad Saidur Rahman,et al. Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks , 2019, Proc. Priv. Enhancing Technol..
[77] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[78] Pushmeet Kohli,et al. Adversarial Risk and the Dangers of Evaluating Against Weak Attacks , 2018, ICML.
[79] Srinivas Devadas,et al. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning , 2018, Proc. Priv. Enhancing Technol..
[80] Tom Goldstein,et al. Are adversarial examples inevitable? , 2018, ICLR.
[81] Yoav Goldberg,et al. LaVAN: Localized and Visible Adversarial Noise , 2018, ICML.