Picture for Ivan Martinovic

Ivan Martinovic

UserBoost: Generating User-specific Synthetic Data for Faster Enrolment into Behavioural Biometric Systems

Add code
Jul 12, 2024
Viaarxiv icon

Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting

Add code
May 11, 2023
Viaarxiv icon

Widen The Backdoor To Let More Attackers In

Add code
Oct 09, 2021
Figure 1 for Widen The Backdoor To Let More Attackers In
Figure 2 for Widen The Backdoor To Let More Attackers In
Figure 3 for Widen The Backdoor To Let More Attackers In
Figure 4 for Widen The Backdoor To Let More Attackers In
Viaarxiv icon

Signal Injection Attacks against CCD Image Sensors

Add code
Aug 19, 2021
Figure 1 for Signal Injection Attacks against CCD Image Sensors
Figure 2 for Signal Injection Attacks against CCD Image Sensors
Figure 3 for Signal Injection Attacks against CCD Image Sensors
Figure 4 for Signal Injection Attacks against CCD Image Sensors
Viaarxiv icon

MalPhase: Fine-Grained Malware Detection Using Network Flow Data

Add code
Jun 01, 2021
Figure 1 for MalPhase: Fine-Grained Malware Detection Using Network Flow Data
Figure 2 for MalPhase: Fine-Grained Malware Detection Using Network Flow Data
Figure 3 for MalPhase: Fine-Grained Malware Detection Using Network Flow Data
Figure 4 for MalPhase: Fine-Grained Malware Detection Using Network Flow Data
Viaarxiv icon

They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors

Add code
Jan 25, 2021
Figure 1 for They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors
Figure 2 for They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors
Figure 3 for They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors
Figure 4 for They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors
Viaarxiv icon

Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020

Add code
Oct 26, 2020
Figure 1 for Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020
Figure 2 for Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020
Figure 3 for Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020
Figure 4 for Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020
Viaarxiv icon

SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations

Add code
Jul 08, 2020
Figure 1 for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
Figure 2 for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
Figure 3 for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
Figure 4 for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
Viaarxiv icon

Seeing Red: PPG Biometrics Using Smartphone Cameras

Add code
Apr 15, 2020
Figure 1 for Seeing Red: PPG Biometrics Using Smartphone Cameras
Figure 2 for Seeing Red: PPG Biometrics Using Smartphone Cameras
Figure 3 for Seeing Red: PPG Biometrics Using Smartphone Cameras
Figure 4 for Seeing Red: PPG Biometrics Using Smartphone Cameras
Viaarxiv icon

Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning

Add code
Dec 11, 2019
Figure 1 for Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning
Figure 2 for Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning
Figure 3 for Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning
Figure 4 for Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning
Viaarxiv icon