HARPO.pdf
705.6 KB
#Research
"HARPO: Learning to Subvert Online Behavioral Advertising", 2021.
"HARPO: Learning to Subvert Online Behavioral Advertising", 2021.
Qu_ANTI_zation.pdf
744.1 KB
"Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes", 2021.
]-> Source code for the paper:
https://github.com/Secure-AI-Systems-Group/Qu-ANTI-zation
#Research
t.iss.one/Library_Sec
]-> Source code for the paper:
https://github.com/Secure-AI-Systems-Group/Qu-ANTI-zation
#Research
t.iss.one/Library_Sec
Adversarial Preprocessing @library_Sec @C2Book_News.pdf
15 MB
#Research
"Adversarial Preprocessing:
Understanding and Preventing Image-Scaling Attacks in Machine Learning", 2021.
]-> https://scaling-attacks.net
"Adversarial Preprocessing:
Understanding and Preventing Image-Scaling Attacks in Machine Learning", 2021.
]-> https://scaling-attacks.net
Pattern_Exploiting_Training.pdf
517.8 KB
#Research
"Improving and Simplifying Pattern Exploiting Training", 2021.
]-> code implementation:
https://github.com/rrmenon10/ADAPET
t.iss.one/Library_Sec
"Improving and Simplifying Pattern Exploiting Training", 2021.
]-> code implementation:
https://github.com/rrmenon10/ADAPET
t.iss.one/Library_Sec
WebAssembly.pdf
132.7 KB
"The Security Risk of Lacking Compiler Protection in WebAssembly", 2021.
#Research
t.iss.one/Library_Sec
#Research
t.iss.one/Library_Sec
Adversarial_Neuron_Pruning.pdf
1.3 MB
#Research
"Adversarial Neuron Pruning Purifies Backdoored Deep Models", 2021.
]-> https://github.com/csdongxian/ANP_backdoor
t.iss.one/Library_Sec
"Adversarial Neuron Pruning Purifies Backdoored Deep Models", 2021.
]-> https://github.com/csdongxian/ANP_backdoor
t.iss.one/Library_Sec
wanet.pdf
3.4 MB
#Research
"WaNet - Imperceptible Warping based Backdoor Attack", 2021.
]-> https://github.com/VinAIResearch/Warping-based_Backdoor_Attack-release
t.iss.one/Library_Sec
"WaNet - Imperceptible Warping based Backdoor Attack", 2021.
]-> https://github.com/VinAIResearch/Warping-based_Backdoor_Attack-release
t.iss.one/Library_Sec
iTimed.pdf
2.2 MB
"iTimed: Cache Attacks on the Apple A10 Fusion SoC", 2021.
]-> https://www.driverentry.com/article/115
#Research
t.iss.one/Library_Sec
]-> https://www.driverentry.com/article/115
#Research
t.iss.one/Library_Sec
BLE_Attack.pdf
788.1 KB
"Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices", 2021.
#Research
#WLAN_Security
t.iss.one/Library_Sec
#Research
#WLAN_Security
t.iss.one/Library_Sec
Sanctuary_lost.pdf
759.7 KB
"Sanctuary lost: a cyber-physical warfare in space", 2021.
// In this paper, we analyze the threats space vehicles are exposed to and what must change to mitigate them. In particular, we shall focus on cyber threats, which may well be mounted by small countries and terrorist organizations...
#Research
t.iss.one/Library_Sec
// In this paper, we analyze the threats space vehicles are exposed to and what must change to mitigate them. In particular, we shall focus on cyber threats, which may well be mounted by small countries and terrorist organizations...
#Research
t.iss.one/Library_Sec