Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning–based cyber attacks targeting on controlled information: A survey
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …
information leakage incidents, has become an emerging cyber security threat in recent …
Tranco: A research-oriented top sites ranking hardened against manipulation
In order to evaluate the prevalence of security and privacy practices on a representative
sample of the Web, researchers rely on website popularity rankings such as the Alexa list …
sample of the Web, researchers rely on website popularity rankings such as the Alexa list …
Rendered insecure: GPU side channel attacks are practical
Graphics Processing Units (GPUs) are commonly integrated with computing devices to
enhance the performance and capabilities of graphical workloads. In addition, they are …
enhance the performance and capabilities of graphical workloads. In addition, they are …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Bluethunder: A 2-level directional predictor based side-channel attack against sgx
T Huo, X Meng, W Wang, C Hao, P Zhao… - IACR Transactions on …, 2020 - incs.ub.rub.de
Software Guard Extension (SGX) is a hardware-based trusted execution environment (TEE)
implemented in recent Intel commodity processors. By isolating the memory of security …
implemented in recent Intel commodity processors. By isolating the memory of security …
{Charger-Surfing}: Exploiting a power line {Side-Channel} for smartphone information leakage
Touchscreen-based mobile devices such as smartphones and tablets are used daily by
billions of people for productivity and entertainment. This paper uncovers a new security …
billions of people for productivity and entertainment. This paper uncovers a new security …
Df-sca: Dynamic frequency side channel attacks are practical
The arm race between hardware security engineers and side-channel researchers has
become more competitive with more sophisticated attacks and defenses in the last decade …
become more competitive with more sophisticated attacks and defenses in the last decade …
[PDF][PDF] Statistical privacy for streaming traffic
Machine learning empowers traffic-analysis attacks that breach users' privacy from their
encrypted traffic. Recent advances in deep learning drastically escalate such threats. One …
encrypted traffic. Recent advances in deep learning drastically escalate such threats. One …
Magneticspy: Exploiting magnetometer in mobile devices for website and application fingerprinting
Recent studies have shown that aggregate CPU usage and power consumption traces on
smartphones can leak information about applications running on the system or websites …
smartphones can leak information about applications running on the system or websites …
DNN model architecture fingerprinting attack on CPU-GPU edge devices
Embedded systems for edge computing are getting more powerful, and some are equipped
with a GPU to enable on-device deep neural network (DNN) learning tasks such as image …
with a GPU to enable on-device deep neural network (DNN) learning tasks such as image …