Picture for Salil Kanhere

Salil Kanhere

PhishClone: Measuring the Efficacy of Cloning Evasion Attacks

Add code
Sep 04, 2022
Figure 1 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 2 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 3 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 4 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Viaarxiv icon

Integrity Fingerprinting of DNN with Double Black-box Design and Verification

Add code
Mar 23, 2022
Figure 1 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 2 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 3 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 4 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Viaarxiv icon

TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

Add code
Mar 15, 2022
Figure 1 for TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing
Figure 2 for TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing
Figure 3 for TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing
Figure 4 for TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing
Viaarxiv icon