Picture for Rachel Greenstadt

Rachel Greenstadt

Can deepfakes be created by novice users?

Add code
Apr 28, 2023
Viaarxiv icon

Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

Add code
Jan 30, 2020
Figure 1 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 2 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 3 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 4 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Viaarxiv icon

Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments

Add code
Mar 16, 2017
Figure 1 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 2 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 3 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 4 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Viaarxiv icon

Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location

Add code
Mar 29, 2015
Figure 1 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Figure 2 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Figure 3 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Figure 4 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Viaarxiv icon