Et-bert: A contextualized datagram representation with pre-training transformers for encrypted traffic classification

X Lin, G Xiong, G Gou, Z Li, J Shi, J Yu - Proceedings of the ACM Web …, 2022 - dl.acm.org
Encrypted traffic classification requires discriminative and robust traffic representation
captured from content-invisible and imbalanced traffic data for accurate classification, which …

Understanding and tackling label errors in deep learning-based vulnerability detection (experience paper)

X Nie, N Li, K Wang, S Wang, X Luo… - Proceedings of the 32nd …, 2023 - dl.acm.org
Software system complexity and security vulnerability diversity are plausible sources of the
persistent challenges in software vulnerability research. Applying deep learning methods for …

[PDF][PDF] Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers.

MH Meng, Q Zhang, G Xia, Y Zheng, Y Zhang, G Bai… - NDSS, 2023 - baigd.github.io
Ever since its genesis, Android has enabled apps to access data and services on mobile
devices. This however involves a wide variety of user-unresettable identifiers (UUIs), eg, the …

Are they toeing the line? diagnosing privacy compliance violations among browser extensions

Y Ling, K Wang, G Bai, H Wang, JS Dong - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
Browser extensions have emerged as integrated characteristics in modern browsers, with
the aim to boost the online browsing experience. Their advantageous position between a …

WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs

S Meng, L Wang, S Wang, K Wang… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Mini-programs (MiniApps), lightweight versions of full-featured mobile apps that run inside a
host app such as WeChat, have become increasingly popular due to their simplified and …

Self-checking deep neural networks for anomalies and adversaries in deployment

Y Xiao, I Beschastnikh, Y Lin, RS Hundal… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Deep Neural Networks (DNNs) have been widely adopted, yet DNN models are surprisingly
unreliable, which raises significant concerns about their use in critical domains. In this work …

Exploring the capabilities and limitations of video stream fingerprinting

T Walsh, T Thomas, A Barton - 2024 IEEE Security and Privacy …, 2024 - ieeexplore.ieee.org
While streaming video has become a dominant form of information on the web, a number of
previous works have shown that encrypted streaming video is vulnerable to network traffic …

A survey on deep learning for website fingerprinting attacks and defenses

P Liu, L He, Z Li - IEEE Access, 2023 - ieeexplore.ieee.org
The attacks and defenses on the information of which website pages are visited by users are
important research subjects in the field of privacy enhancing technologies, they are termed …

FingerprinTV: Fingerprinting Smart TV Apps

J Varmarken, J Al Aaraj, R Trimananda… - Proceedings on Privacy …, 2022 - par.nsf.gov
This paper proposes FingerprinTV, a fully automated methodology for extracting fingerprints
from the network traffic of smart TV apps and assessing their performance. FingerprinTV (1) …

Repairing failure-inducing inputs with input reflection

Y Xiao, Y Lin, I Beschastnikh, C Sun… - Proceedings of the 37th …, 2022 - dl.acm.org
Trained with a sufficiently large training and testing dataset, Deep Neural Networks (DNNs)
are expected to generalize. However, inputs may deviate from the training dataset …