Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2023
Membership Inference Attacks Against Sequential Recommender Systems
WWW '23: Proceedings of the ACM Web Conference 2023Pages 1208–1219https://doi.org/10.1145/3543507.3583447Recent studies have demonstrated the vulnerability of recommender systems to membership inference attacks, which determine whether a user’s historical data was utilized for model training, posing serious privacy leakage issues. Existing works assumed ...
Label Information Enhanced Fraud Detection against Low Homophily in Graphs
- Yuchen Wang,
- Jinghui Zhang,
- Zhengjie Huang,
- Weibin Li,
- Shikun Feng,
- Ziheng Ma,
- Yu Sun,
- Dianhai Yu,
- Fang Dong,
- Jiahui Jin,
- Beilun Wang,
- Junzhou Luo
WWW '23: Proceedings of the ACM Web Conference 2023Pages 406–416https://doi.org/10.1145/3543507.3583373Node classification is a substantial problem in graph-based fraud detection. Many existing works adopt Graph Neural Networks (GNNs) to enhance fraud detectors. While promising, currently most GNN-based fraud detectors fail to generalize to the low ...
- research-articleApril 2023
Addressing Heterophily in Graph Anomaly Detection: A Perspective of Graph Spectrum
WWW '23: Proceedings of the ACM Web Conference 2023Pages 1528–1538https://doi.org/10.1145/3543507.3583268Graph anomaly detection (GAD) suffers from heterophily — abnormal nodes are sparse so that they are connected to vast normal nodes. The current solutions upon Graph Neural Networks (GNNs) blindly smooth the representation of neiboring nodes, thus ...
- research-articleApril 2023
Are Mobile Advertisements in Compliance with App’s Age Group?
WWW '23: Proceedings of the ACM Web Conference 2023Pages 3132–3141https://doi.org/10.1145/3543507.3583534As smartphones and mobile apps permeate every aspect of people’s lives, children are accessing mobile devices at an increasingly younger age. The inescapable exposure of advertisements in mobile apps to children has grown alarmingly. Mobile ...
- research-articleApril 2023
Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning
WWW '23: Proceedings of the ACM Web Conference 2023Pages 2284–2294https://doi.org/10.1145/3543507.3583394Web vulnerability scanners (WVS) are an indispensable tool for penetration testers and developers of web applications, allowing them to identify and fix low-hanging vulnerabilities before they are discovered by attackers. Unfortunately, malicious actors ...
- research-articleApril 2023
The Chameleon on the Web: an Empirical Study of the Insidious Proactive Web Defacements
WWW '23: Proceedings of the ACM Web Conference 2023Pages 2241–2251https://doi.org/10.1145/3543507.3583377Web defacement is one of the major promotional channels for online underground economies. It regularly compromises benign websites and injects fraudulent content to promote illicit goods and services. It inflicts significant harm to websites’ reputations ...
- research-articleApril 2023
Cross-Modality Mutual Learning for Enhancing Smart Contract Vulnerability Detection on Bytecode
WWW '23: Proceedings of the ACM Web Conference 2023Pages 2220–2229https://doi.org/10.1145/3543507.3583367Over the past couple of years, smart contracts have been plagued by multifarious vulnerabilities, which have led to catastrophic financial losses. Their security issues, therefore, have drawn intense attention. As countermeasures, a family of tools has ...
The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox
WWW '23: Proceedings of the ACM Web Conference 2023Pages 2209–2219https://doi.org/10.1145/3543507.3583352Recently, bug-bounty programs have gained popularity and become a significant part of the security culture of many organizations. Bug-bounty programs enable organizations to enhance their security posture by harnessing the diverse expertise of crowds of ...
Training-free Lexical Backdoor Attacks on Language Models
WWW '23: Proceedings of the ACM Web Conference 2023Pages 2198–2208https://doi.org/10.1145/3543507.3583348Large-scale language models have achieved tremendous success across various natural language processing (NLP) applications. Nevertheless, language models are vulnerable to backdoor attacks, which inject stealthy triggers into models for steering them to ...
- research-articleApril 2023
BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection
WWW '23: Proceedings of the ACM Web Conference 2023Pages 2189–2197https://doi.org/10.1145/3543507.3583345As various forms of fraud proliferate on Ethereum, it is imperative to safeguard against these malicious activities to protect susceptible users from being victimized. While current studies solely rely on graph-based fraud detection approaches, it is ...
- research-articleApril 2023
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children’s Apps
WWW '23: Proceedings of the ACM Web Conference 2023Pages 2166–2177https://doi.org/10.1145/3543507.3583327The digital age has brought a world of opportunity to children. Connectivity can be a game-changer for some of the world’s most marginalized children. However, while legislatures around the world have enacted regulations to protect children’s online ...
- research-articleApril 2023
All Your Shops Are Belong to Us: Security Weaknesses in E-commerce Platforms
WWW '23: Proceedings of the ACM Web Conference 2023Pages 2144–2154https://doi.org/10.1145/3543507.3583319Software as a Service (SaaS) e-commerce platforms for merchants allow individual business owners to set up their online stores almost instantly. Prior work has shown that the checkout flows and payment integration of some e-commerce applications are ...
- research-articleApril 2023
Do NFTs’ Owners Really Possess their Assets? A First Look at the NFT-to-Asset Connection Fragility
WWW '23: Proceedings of the ACM Web Conference 2023Pages 2099–2109https://doi.org/10.1145/3543507.3583281Most NFTs (Non-Fungible Tokens) use multi-hop URLs to address the off-chain assets due to the costly on-chain storage, but the path from NFTs to the underlying assets is fraught with instability, which may degrade its value. Hence, this paper aims to ...