Fingerprinting Method

Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication

Authors: Hyunmin Choi, Simon Woo, Hyoungshick Kim | Published: 2023-12-18 | Updated: 2024-04-01
Watermarking
Fingerprinting Method
Privacy Protection

Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification

Authors: Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan | Published: 2023-12-13
Graph Neural Network
Fingerprinting Method
Robustness Evaluation

Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities

Authors: Saeif Al-Hazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos | Published: 2023-10-25 | Updated: 2024-04-15
IoT Device Identification
Fingerprinting Method
Model Design

IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification

Authors: Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin Sagduyu | Published: 2022-01-10 | Updated: 2023-12-16
Fingerprinting Method
Multi-Class Classification
Communication Model

FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting

Authors: Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq | Published: 2021-12-03 | Updated: 2021-12-14
Data Extraction and Analysis
Fingerprinting Method
Privacy Risk Management

On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti | Published: 2021-10-28
Fingerprinting Method
Hypothesis Testing
Wireless Channel Detection

Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters

Authors: Han Wang | Published: 2021-10-04
Data Leakage
Fingerprinting Method
Performance Evaluation

Robust Website Fingerprinting Through the Cache Occupancy Channel

Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom | Published: 2018-11-17 | Updated: 2019-02-21
Fingerprinting Method
Attack Evaluation
Defense Method