Skip to content

Commit

Permalink
update
Browse files Browse the repository at this point in the history
  • Loading branch information
jS5t3r committed Nov 4, 2024
1 parent 906d8d2 commit 58eae21
Show file tree
Hide file tree
Showing 3 changed files with 21 additions and 163 deletions.
11 changes: 0 additions & 11 deletions _posts/2023-03-21-rw-ms.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,17 +28,6 @@ A note on the data: This list updates automatically with new papers, sometimes b

Below, you'll find the comprehensive paper list. I've also provided [JSON](https://github.com/lorenz-peter/lorenz-peter.github.io/blob/master/assets/json/model_stealing_papers.json) file containing the same data, including one with abstracts. If you use this data for any interesting projects, I'd love to hear about your experiences.

{::nomarkdown}
{% assign jupyter_path = "assets/jupyter/load_json.ipynb" | relative_url %}
{% capture notebook_exists %}{% file_exists assets/jupyter/load_json.ipynb %}{% endcapture %}
{% if notebook_exists == "true" %}
{% jupyter_notebook jupyter_path %}
{% else %}

<p>Sorry, the notebook you are looking for does not exist.</p>
{% endif %}
{:/nomarkdown}

## Acknowledgment

The idea is derived from Nicolas Carlini:
Expand Down
2 changes: 1 addition & 1 deletion _projects/1_project.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@ category: work
related_publications: true
---

safdaf
fsafda
171 changes: 20 additions & 151 deletions assets/jupyter/load_json.ipynb
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@
},
{
"cell_type": "code",
"execution_count": 11,
"execution_count": 25,
"metadata": {},
"outputs": [
{
Expand Down Expand Up @@ -74,171 +74,41 @@
" <td>http://arxiv.org/abs/1412.8356v5</td>\n",
" <td>Many efficient data structures use randomness,...</td>\n",
" </tr>\n",
" <tr>\n",
" <th>3</th>\n",
" <td>2014-12-27</td>\n",
" <td>Attacks exploiting deviation of mean photon nu...</td>\n",
" <td>Shihan Sajeed, Igor Radchenko, Sarah Kaiser, J...</td>\n",
" <td>http://arxiv.org/abs/1412.8032v2</td>\n",
" <td>The security of quantum communication using a ...</td>\n",
" </tr>\n",
" <tr>\n",
" <th>4</th>\n",
" <td>2014-12-24</td>\n",
" <td>Balancing Isolation and Sharing of Data for Th...</td>\n",
" <td>Florian Schröder, Raphael M. Reischuk, and Joh...</td>\n",
" <td>http://arxiv.org/abs/1412.7641v2</td>\n",
" <td>In the landscape of application ecosystems, to...</td>\n",
" </tr>\n",
" <tr>\n",
" <th>...</th>\n",
" <td>...</td>\n",
" <td>...</td>\n",
" <td>...</td>\n",
" <td>...</td>\n",
" <td>...</td>\n",
" </tr>\n",
" <tr>\n",
" <th>196</th>\n",
" <td>2014-01-15</td>\n",
" <td>Multipath Private Communication: An Informatio...</td>\n",
" <td>Hadi Ahmadi, and Reihaneh Safavi-Naini</td>\n",
" <td>http://arxiv.org/abs/1401.3659v1</td>\n",
" <td>Sending private messages over communication en...</td>\n",
" </tr>\n",
" <tr>\n",
" <th>197</th>\n",
" <td>2014-01-15</td>\n",
" <td>Intelligent Systems for Information Security</td>\n",
" <td>Ayman M. Bahaa-Eldin</td>\n",
" <td>http://arxiv.org/abs/1401.3592v1</td>\n",
" <td>This thesis aims to use intelligent systems to...</td>\n",
" </tr>\n",
" <tr>\n",
" <th>198</th>\n",
" <td>2014-01-13</td>\n",
" <td>A reduced semantics for deciding trace equival...</td>\n",
" <td>David Baelde, Stéphanie Delaune, and Lucca Hir...</td>\n",
" <td>http://arxiv.org/abs/1401.2854v2</td>\n",
" <td>Many privacy-type properties of security proto...</td>\n",
" </tr>\n",
" <tr>\n",
" <th>199</th>\n",
" <td>2014-01-12</td>\n",
" <td>Practical and fast quantum random number gener...</td>\n",
" <td>You-Qi Nie, Hong-Fei Zhang, Zhen Zhang, Jian W...</td>\n",
" <td>http://arxiv.org/abs/1401.2594v1</td>\n",
" <td>We present a practical high-speed quantum rand...</td>\n",
" </tr>\n",
" <tr>\n",
" <th>200</th>\n",
" <td>2014-01-06</td>\n",
" <td>Power Grid Defense Against Malicious Cascading...</td>\n",
" <td>Paulo Shakarian, Hansheng Lei, and Roy Lindelauf</td>\n",
" <td>http://arxiv.org/abs/1401.1086v1</td>\n",
" <td>An adversary looking to disrupt a power grid m...</td>\n",
" </tr>\n",
" </tbody>\n",
"</table>\n",
"<p>201 rows × 5 columns</p>\n",
"</div>"
],
"text/plain": [
" date title \\\n",
"0 2014-12-30 Detecting Malicious Code by Exploiting Depende... \n",
"1 2014-12-30 Percolation Model of Insider Threats to Assess... \n",
"2 2014-12-29 Bloom Filters in Adversarial Environments \n",
"3 2014-12-27 Attacks exploiting deviation of mean photon nu... \n",
"4 2014-12-24 Balancing Isolation and Sharing of Data for Th... \n",
".. ... ... \n",
"196 2014-01-15 Multipath Private Communication: An Informatio... \n",
"197 2014-01-15 Intelligent Systems for Information Security \n",
"198 2014-01-13 A reduced semantics for deciding trace equival... \n",
"199 2014-01-12 Practical and fast quantum random number gener... \n",
"200 2014-01-06 Power Grid Defense Against Malicious Cascading... \n",
"\n",
" author \\\n",
"0 Stavros D. Nikolopoulos, and Iosif Polenakis \n",
"1 Jeremy Kepner, Vijay Gadepally, and Pete Micha... \n",
"2 Moni Naor, and Eylon Yogev \n",
"3 Shihan Sajeed, Igor Radchenko, Sarah Kaiser, J... \n",
"4 Florian Schröder, Raphael M. Reischuk, and Joh... \n",
".. ... \n",
"196 Hadi Ahmadi, and Reihaneh Safavi-Naini \n",
"197 Ayman M. Bahaa-Eldin \n",
"198 David Baelde, Stéphanie Delaune, and Lucca Hir... \n",
"199 You-Qi Nie, Hong-Fei Zhang, Zhen Zhang, Jian W... \n",
"200 Paulo Shakarian, Hansheng Lei, and Roy Lindelauf \n",
" date title \\\n",
"0 2014-12-30 Detecting Malicious Code by Exploiting Depende... \n",
"1 2014-12-30 Percolation Model of Insider Threats to Assess... \n",
"2 2014-12-29 Bloom Filters in Adversarial Environments \n",
"\n",
" link \\\n",
"0 http://arxiv.org/abs/1412.8712v1 \n",
"1 http://arxiv.org/abs/1412.8699v1 \n",
"2 http://arxiv.org/abs/1412.8356v5 \n",
"3 http://arxiv.org/abs/1412.8032v2 \n",
"4 http://arxiv.org/abs/1412.7641v2 \n",
".. ... \n",
"196 http://arxiv.org/abs/1401.3659v1 \n",
"197 http://arxiv.org/abs/1401.3592v1 \n",
"198 http://arxiv.org/abs/1401.2854v2 \n",
"199 http://arxiv.org/abs/1401.2594v1 \n",
"200 http://arxiv.org/abs/1401.1086v1 \n",
" author \\\n",
"0 Stavros D. Nikolopoulos, and Iosif Polenakis \n",
"1 Jeremy Kepner, Vijay Gadepally, and Pete Micha... \n",
"2 Moni Naor, and Eylon Yogev \n",
"\n",
" abstract \n",
"0 In this paper we present an elaborated graph-b... \n",
"1 Rules, regulations, and policies are the basis... \n",
"2 Many efficient data structures use randomness,... \n",
"3 The security of quantum communication using a ... \n",
"4 In the landscape of application ecosystems, to... \n",
".. ... \n",
"196 Sending private messages over communication en... \n",
"197 This thesis aims to use intelligent systems to... \n",
"198 Many privacy-type properties of security proto... \n",
"199 We present a practical high-speed quantum rand... \n",
"200 An adversary looking to disrupt a power grid m... \n",
" link \\\n",
"0 http://arxiv.org/abs/1412.8712v1 \n",
"1 http://arxiv.org/abs/1412.8699v1 \n",
"2 http://arxiv.org/abs/1412.8356v5 \n",
"\n",
"[201 rows x 5 columns]"
" abstract \n",
"0 In this paper we present an elaborated graph-b... \n",
"1 Rules, regulations, and policies are the basis... \n",
"2 Many efficient data structures use randomness,... "
]
},
"execution_count": 11,
"execution_count": 25,
"metadata": {},
"output_type": "execute_result"
}
],
"source": [
"file_path = \"../json/model_stealing_papers.json\"\n",
"df = pd.read_json(file_path)\n",
"df"
]
},
{
"cell_type": "code",
"execution_count": 15,
"metadata": {},
"outputs": [
{
"data": {
"text/plain": [
"0 2014\n",
"1 2014\n",
"2 2014\n",
"3 2014\n",
"4 2014\n",
" ... \n",
"196 2014\n",
"197 2014\n",
"198 2014\n",
"199 2014\n",
"200 2014\n",
"Name: date, Length: 201, dtype: int32"
]
},
"execution_count": 15,
"metadata": {},
"output_type": "execute_result"
}
],
"source": [
"df['date'].dt.year"
"df.head(3)"
]
},
{
Expand Down Expand Up @@ -273,7 +143,7 @@
},
{
"cell_type": "code",
"execution_count": 23,
"execution_count": null,
"metadata": {},
"outputs": [
{
Expand Down Expand Up @@ -310,7 +180,6 @@
],
"source": [
"df[\"first_author\"] = df['author'].apply(lambda x: x.split(',')[0].strip())\n",
"\n",
"qd_authors = df.groupby(df[\"first_author\"])[\"first_author\"].count().sort_values(ascending=False)\n",
"qd_authors.head(20)"
]
Expand Down

0 comments on commit 58eae21

Please sign in to comment.