Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
Eagle: Toward Scalable and Near-Optimal Network-Wide Sketch Deployment in Network Measurement
- Xiang Chen,
- Qingjiang Xiao,
- Hongyan Liu,
- Qun Huang,
- Dong Zhang,
- Xuan Liu,
- Longbing Hu,
- Haifeng Zhou,
- Chunming Wu,
- Kui Ren
ACM SIGCOMM '24: Proceedings of the ACM SIGCOMM 2024 ConferencePages 291–310https://doi.org/10.1145/3651890.3672244Sketches are useful for network measurement thanks to their low resource overheads and theoretically bounded accuracy. However, their network-wide deployment suffers from the trade-off between optimality and scalability: (1) Most solutions rely on mixed ...
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores
Proceedings of the VLDB Endowment (PVLDB), Volume 17, Issue 10Pages 2445–2458https://doi.org/10.14778/3675034.3675038Numerous studies have underscored the significant privacy risks associated with various leakage patterns in encrypted data stores. While many solutions have been proposed to mitigate these leakages, they either (1) incur substantial overheads, (2) focus ...
CSChecker: Revisiting GDPR and CCPA Compliance of Cookie Banners on the Web
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 174, Pages 1–12https://doi.org/10.1145/3597503.3639159Privacy regulations like GDPR and CCPA have greatly affected online advertising and tracking strategies. To comply with the regulations, websites need to display consent management UIs (i.e., cookie banners) implemented under the corresponding technical ...
- research-articleMarch 2024
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory
Proceedings of the ACM on Management of Data (PACMMOD), Volume 2, Issue 1Article No.: 30, Pages 1–27https://doi.org/10.1145/3639285Top-k frequent items detection is a fundamental task in data stream mining. Many promising solutions are proposed to improve memory efficiency while still maintaining high accuracy for detecting the Top-k items. Despite the memory efficiency concern, the ...
-
- research-articleApril 2024
Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming
IUI '24: Proceedings of the 29th International Conference on Intelligent User InterfacesPages 35–50https://doi.org/10.1145/3640543.3645146Recent years have witnessed a dramatic growing trend of Virtual YouTubers (VTubers) as a new business on social media, such as YouTube, Twitch, and TikTok. However, a significant challenge arises when VTuber voice actors face health issues or retire, ...
P-Shapley: Shapley Values on Probabilistic Classifiers
Proceedings of the VLDB Endowment (PVLDB), Volume 17, Issue 7Pages 1737–1750https://doi.org/10.14778/3654621.3654638The Shapley value provides a unique approach to equitably gauge each player's contribution within a coalition and has extensive applications with various utility functions. In data valuation for machine learning, particularly for classification tasks, ...
Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 24, Pages 1–13https://doi.org/10.1145/3597503.3623352Rust programming language is gaining popularity rapidly in building reliable and secure systems due to its security guarantees and outstanding performance. To provide extra functionalities, the Rust compiler introduces Rust unstable features (RUF) to ...
- research-articleFebruary 2024
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 30, Pages 1–13https://doi.org/10.1145/3597503.3623348Causal discovery is a powerful technique for identifying causal relationships among variables in data. It has been widely used in various applications in software engineering. Causal discovery extensively involves conditional independence (CI) tests. ...
- research-articleJanuary 2024
<inline-formula><tex-math notation="LaTeX">$\mathsf {monoCash}$</tex-math><alternatives><mml:math><mml:mi mathvariant="sans-serif">monoCash</mml:mi></mml:math><inline-graphic xlink:href="liu-ieq1-3354927.gif"/></alternatives></inline-formula>: A Channel-Free Payment Network via Trusted Monotonic Counters
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 5Pages 4770–4783https://doi.org/10.1109/TDSC.2024.3354927Cryptocurrencies such as Bitcoin and Ethereum are gaining popularity thanks to their prominent advantages compared to legacy financial transaction systems. However, they require all participants to reach a consensus on the order of transactions, which ...
- research-articleJanuary 2024
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 5Pages 4574–4588https://doi.org/10.1109/TDSC.2024.3354991Cache side-channel attacks remain a stubborn source of cross-core secret leakage. Such attacks exploit the timing difference between cache hits and misses. Most defenses thus choose to prevent cache evictions. Given that two possible types of evictions&#...
- research-articleMarch 2024
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 4199–4214https://doi.org/10.1109/TIFS.2024.3376192Despite their prevalence and indispensability in the perception modules of autonomous vehicles, cameras have shown susceptibility to numerous attacks. Among them, the phantom spoofing attack is of significant concern. In such attacks, malefactors employ ...
- research-articleDecember 2023
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 1948–1962https://doi.org/10.1109/TIFS.2023.3345639As one of the most representative applications built on deep learning, audio systems, including keyword spotting, automatic speech recognition, and speaker identification, have recently been demonstrated to be vulnerable to adversarial examples, which ...
- research-articleMay 2024
Certified minimax unlearning with generalization rates and deletion capacity
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing SystemsArticle No.: 2744, Pages 62821–62852We study the problem of (ε, δ)-certified machine unlearning for minimax models. Most of the existing works focus on unlearning from standard statistical learning models that have a single variable and their unlearning steps hinge on the direct Hessian-...
- research-articleMay 2024
CAPP-130: a corpus of chinese application privacy policy summarization and interpretation
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing SystemsArticle No.: 2026, Pages 46773–46785A privacy policy serves as an online internet protocol crafted by service providers, which details how service providers collect, process, store, manage, and use personal information when users engage with applications. However, these privacy policies ...
- research-articleNovember 2023
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 1660–1674https://doi.org/10.1145/3576915.3616600Physically unclonable hardware fingerprints can be used for device authentication. The photo-response non-uniformity (PRNU) is the most reliable hardware fingerprint of digital cameras and can be conveniently extracted from images. However, we find image ...
- research-articleNovember 2023
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 416–430https://doi.org/10.1145/3576915.3616599Deep learning classifiers achieve state-of-the-art performance in various risk detection applications. They explore rich semantic representations and are supposed to automatically discover risk behaviors. However, due to the lack of transparency, the ...
- research-articleApril 2024
Ghost-Probe: NLOS Pedestrian Rushing Detection with Monocular Camera for Automated Driving
SenSys '23: Proceedings of the 21st ACM Conference on Embedded Networked Sensor SystemsPages 390–402https://doi.org/10.1145/3625687.3625791One of the most serious factors compromising driving safety is when people in drivers' non-line-of-sight areas rush out suddenly. Existing studies on non-line-of-sight imaging rely on expensive equipment or are limited to severe laboratory conditions (...
- research-articleApril 2024
FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge
SenSys '23: Proceedings of the 21st ACM Conference on Embedded Networked Sensor SystemsPages 167–180https://doi.org/10.1145/3625687.3625783Fingerprint recognition has been a vital security guard for various applications whose vulnerability has been explored by different works. However, previous works on spoofing fingerprint recognition rely on prior knowledge (e.g., photos and minutiae) of ...
- research-articleSeptember 2024
Demystifying Template-Based Invariant Generation for Bit-Vector Programs
ASE '23: Proceedings of the 38th IEEE/ACM International Conference on Automated Software EngineeringPages 673–685https://doi.org/10.1109/ASE56229.2023.00069The template-based approach to invariant generation is a parametric and relatively complete methodology for inferring loop invariants. The relative completeness ensures the generated invariants' accuracy up to the template's form and the inductive ...