-
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks
To this date, CAPTCHAs have served as the first line of defense preventi...
read it
-
EnCoD: Distinguishing Compressed and Encrypted File Fragments
Reliable identification of encrypted file fragments is a requirement for...
read it
-
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Recent progress in machine learning has generated promising results in b...
read it
-
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques
Deep neural networks have had enormous impact on various domains of comp...
read it

Dorjan Hitaj
is this you? claim profile