Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication Authors: Hyunmin Choi, Simon Woo, Hyoungshick Kim | Published: 2023-12-18 | Updated: 2024-04-01 WatermarkingFingerprinting MethodPrivacy Protection 2023.12.18 2025.05.27 Literature Database
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification Authors: Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan | Published: 2023-12-13 Graph Neural NetworkFingerprinting MethodRobustness Evaluation 2023.12.13 2025.05.28 Literature Database
Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities Authors: Saeif Al-Hazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos | Published: 2023-10-25 | Updated: 2024-04-15 IoT Device IdentificationFingerprinting MethodModel Design 2023.10.25 2025.05.28 Literature Database
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification Authors: Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin Sagduyu | Published: 2022-01-10 | Updated: 2023-12-16 Fingerprinting MethodMulti-Class ClassificationCommunication Model 2022.01.10 2025.05.28 Literature Database
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting Authors: Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq | Published: 2021-12-03 | Updated: 2021-12-14 Data Extraction and AnalysisFingerprinting MethodPrivacy Risk Management 2021.12.03 2025.05.28 Literature Database
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti | Published: 2021-10-28 Fingerprinting MethodHypothesis TestingWireless Channel Detection 2021.10.28 2025.05.28 Literature Database
Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters Authors: Han Wang | Published: 2021-10-04 Data LeakageFingerprinting MethodPerformance Evaluation 2021.10.04 2025.05.28 Literature Database
Robust Website Fingerprinting Through the Cache Occupancy Channel Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom | Published: 2018-11-17 | Updated: 2019-02-21 Fingerprinting MethodAttack EvaluationDefense Method 2018.11.17 2025.05.28 Literature Database