↓ Skip to main content

Computer Security – ESORICS 2022

Overview of attention for book
Cover of 'Computer Security – ESORICS 2022'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Blockchain-Based Long-Term Time-Stamping Scheme
  3. Altmetric Badge
    Chapter 2 Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
  4. Altmetric Badge
    Chapter 3 Opportunistic Algorithmic Double-Spending:
  5. Altmetric Badge
    Chapter 4 Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?
  6. Altmetric Badge
    Chapter 5 Secure Hierarchical Deterministic Wallet Supporting Stealth Address
  7. Altmetric Badge
    Chapter 6 Zero-Knowledge Age Restriction for GNU Taler
  8. Altmetric Badge
    Chapter 7 Privacy Leakage in Privacy-Preserving Neural Network Inference
  9. Altmetric Badge
    Chapter 8 Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences
  10. Altmetric Badge
    Chapter 9 One Vote Is Enough for Analysing Privacy
  11. Altmetric Badge
    Chapter 10 Local Differential Privacy for Federated Learning
  12. Altmetric Badge
    Chapter 11 XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWE
  13. Altmetric Badge
    Chapter 12 Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic
  14. Altmetric Badge
    Chapter 13 Generic Construction of Trace-and-Revoke Inner Product Functional Encryption
  15. Altmetric Badge
    Chapter 14 Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More
  16. Altmetric Badge
    Chapter 15 Public Key Authenticated Encryption with Keyword Search from LWE
  17. Altmetric Badge
    Chapter 16 An Efficient Query Recovery Attack Against a Graph Encryption Scheme
  18. Altmetric Badge
    Chapter 17 New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead
  19. Altmetric Badge
    Chapter 18 A Formal Model for Credential Hopping Attacks
  20. Altmetric Badge
    Chapter 19 No-Directional and Backward-Leak Uni-Directional Updatable Encryption Are Equivalent
  21. Altmetric Badge
    Chapter 20 Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts
  22. Altmetric Badge
    Chapter 21 Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability
  23. Altmetric Badge
    Chapter 22 Kallima : A Clean-Label Framework for Textual Backdoor Attacks
  24. Altmetric Badge
    Chapter 23 Two Types of Novel DoS Attacks Against CDNs Based on HTTP/2 Flow Control Mechanism
  25. Altmetric Badge
    Chapter 24 EVExchange: A Relay Attack on Electric Vehicle Charging System
  26. Altmetric Badge
    Chapter 25 Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
  27. Altmetric Badge
    Chapter 26 Cyber Network Resilience Against Self-Propagating Malware Attacks
  28. Altmetric Badge
    Chapter 27 INC: In-Network Classification of Botnet Propagation at Line Rate
  29. Altmetric Badge
    Chapter 28 GAME: Generative-Based Adaptive Model Extraction Attack
  30. Altmetric Badge
    Chapter 29 AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
  31. Altmetric Badge
    Chapter 30 SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection
  32. Altmetric Badge
    Chapter 31 We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads
  33. Altmetric Badge
    Chapter 32 VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents
  34. Altmetric Badge
    Chapter 33 Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange
  35. Altmetric Badge
    Chapter 34 BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration
Attention for Chapter 30: SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection
Altmetric Badge

Mentioned by

twitter
1 X user

Readers on

mendeley
3 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection
Chapter number 30
Book title
Computer Security – ESORICS 2022
Published by
Springer, Cham, January 2022
DOI 10.1007/978-3-031-17140-6_30
Book ISBNs
978-3-03-117139-0, 978-3-03-117140-6
Authors

Liu, Xinjing, Ma, Zhuo, Liu, Yang, Qin, Zhan, Zhang, Junwei, Wang, Zhuzhu

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 3 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 3 100%

Demographic breakdown

Readers by professional status Count As %
Unspecified 1 33%
Student > Master 1 33%
Unknown 1 33%
Readers by discipline Count As %
Unspecified 1 33%
Computer Science 1 33%
Unknown 1 33%