"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Yuyou Gan,Yuhao Mao,Xuhong Zhang,纪守领 Shouling Ji,Yuwen Pu,Meng Han,尹建伟 Jianwei Yin,Ting Wang
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems
Jiangyi Deng,Yanjiao Chen,徐文渊 Wenyuan Xu
Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs
Qingyang Zhou,Qiushi Wu,Dinghao Liu,纪守领 Shouling Ji,Kangjie Lu
Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API
Xiao Han,Junjie Xiong,申文博 Wenbo Shen,Zhuo Lu,Yao Liu
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response
Han Wang,Hanbin Hong,Li Xiong,秦湛 Zhan Qin,Yuan Hong
VOProof: Efficient zkSNARKs from Vector Oracle Compilers
Yuncong Zhang,Alan Szepeniec,Ren Zhang,Shi-Feng Sun,Geng Wang,谷大武 Dawu Gu
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Jiawei Liu,Yangyang Kang,Di Tang,Kaisong Song,Changlong Sun,Xiaofeng Wang,Wei Lu,Xiaozhong Liu
An Extensive Study of Residential Proxies in China
Mingshuo Yang,Yunnan Yu,Xianghang Mi,Shujun Tang,Shanqing Guo,Yilin Li,Xiaofeng Zheng,段海新 Haixin Duan