Picture for Erwin Quiring

Erwin Quiring

AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images

Add code
Apr 22, 2024
Viaarxiv icon

The Impact of Uniform Inputs on Activation Sparsity and Energy-Latency Attacks in Computer Vision

Add code
Mar 27, 2024
Viaarxiv icon

On the Detection of Image-Scaling Attacks in Machine Learning

Add code
Oct 23, 2023
Viaarxiv icon

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

Add code
Mar 25, 2023
Viaarxiv icon

I still know it's you! On Challenges in Anonymizing Source Code

Add code
Aug 26, 2022
Figure 1 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 2 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 3 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 4 for I still know it's you! On Challenges in Anonymizing Source Code
Viaarxiv icon

Misleading Deep-Fake Detection with GAN Fingerprints

Add code
May 25, 2022
Figure 1 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 2 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 3 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 4 for Misleading Deep-Fake Detection with GAN Fingerprints
Viaarxiv icon

Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification

Add code
Oct 19, 2020
Figure 1 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 2 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 3 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 4 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Viaarxiv icon

Dos and Don'ts of Machine Learning in Computer Security

Add code
Oct 19, 2020
Figure 1 for Dos and Don'ts of Machine Learning in Computer Security
Figure 2 for Dos and Don'ts of Machine Learning in Computer Security
Figure 3 for Dos and Don'ts of Machine Learning in Computer Security
Figure 4 for Dos and Don'ts of Machine Learning in Computer Security
Viaarxiv icon

Backdooring and Poisoning Neural Networks with Image-Scaling Attacks

Add code
Mar 19, 2020
Figure 1 for Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Figure 2 for Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Figure 3 for Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Figure 4 for Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Viaarxiv icon

Misleading Authorship Attribution of Source Code using Adversarial Learning

Add code
May 31, 2019
Figure 1 for Misleading Authorship Attribution of Source Code using Adversarial Learning
Figure 2 for Misleading Authorship Attribution of Source Code using Adversarial Learning
Figure 3 for Misleading Authorship Attribution of Source Code using Adversarial Learning
Figure 4 for Misleading Authorship Attribution of Source Code using Adversarial Learning
Viaarxiv icon