2023 |
|
Localized Shortcut Removal |
|
|
R2-AD2: Detecting Anomalies by Analysing the Raw Gradient |
2022 |
|
Real or Fake? A Practical Method for Detecting Tempered Images |
|
|
Assessing the Impact of Transformations on Physical Adversarial Attacks |
|
|
Anomaly Detection by Recombining Gated Unsupervised Experts |
|
|
Rectifying adversarial inputs using XAI techniques |
|
|
Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators |
2021 |
|
DA3G: Detecting Adversarial Attacks by Analysing Gradients |
|
|
Language Dependencies in Adversarial Attacks on Speech Recognition Systems |
|
|
Visualizing Automatic Speech Recognition Means for a Better Understanding? |
2019 |
|
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography |
2018 |
|
High-performance unsupervised anomaly detection for cyber-physical system networks |
|
|
Deep Reinforcement Fuzzing |
2017 |
|
Guiding a colony of black-box fuzzers with chemotaxis |
|
|
Stack overflow considered harmful? The impact of copy&paste on Android application security |
2016 |
|
Fuzzing binaries with Lévy flight swarms |
|
|
DeepFuzz: Triggering vulnerabilities deeply hidden in binaries |
|
|
Detecting and correlating supranational threats for critical infrastructures |
|
|
Hunting bugs with Lévy flight foraging |
2015 |
|
Detecting Fingerprinted Data in TLS Traffic |
2012 |
|
A Secure Architecture for Smart Meter Systems |