Picture for Alsharif Abuadbba

Alsharif Abuadbba

SoK: Facial Deepfake Detectors

Add code
Jan 09, 2024
Figure 1 for SoK: Facial Deepfake Detectors
Figure 2 for SoK: Facial Deepfake Detectors
Figure 3 for SoK: Facial Deepfake Detectors
Figure 4 for SoK: Facial Deepfake Detectors
Viaarxiv icon

Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices

Add code
Mar 26, 2023
Figure 1 for Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices
Viaarxiv icon

Cybersecurity Challenges of Power Transformers

Add code
Feb 25, 2023
Figure 1 for Cybersecurity Challenges of Power Transformers
Figure 2 for Cybersecurity Challenges of Power Transformers
Figure 3 for Cybersecurity Challenges of Power Transformers
Figure 4 for Cybersecurity Challenges of Power Transformers
Viaarxiv icon

Why Do Deepfake Detectors Fail?

Add code
Feb 25, 2023
Figure 1 for Why Do Deepfake Detectors Fail?
Figure 2 for Why Do Deepfake Detectors Fail?
Figure 3 for Why Do Deepfake Detectors Fail?
Figure 4 for Why Do Deepfake Detectors Fail?
Viaarxiv icon

Tracking Dataset IP Use in Deep Neural Networks

Add code
Nov 24, 2022
Figure 1 for Tracking Dataset IP Use in Deep Neural Networks
Figure 2 for Tracking Dataset IP Use in Deep Neural Networks
Figure 3 for Tracking Dataset IP Use in Deep Neural Networks
Figure 4 for Tracking Dataset IP Use in Deep Neural Networks
Viaarxiv icon

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

Add code
Sep 06, 2022
Figure 1 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 2 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 3 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 4 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Viaarxiv icon

PhishClone: Measuring the Efficacy of Cloning Evasion Attacks

Add code
Sep 04, 2022
Figure 1 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 2 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 3 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 4 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Viaarxiv icon

Profiler: Profile-Based Model to Detect Phishing Emails

Add code
Aug 18, 2022
Figure 1 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 2 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 3 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 4 for Profiler: Profile-Based Model to Detect Phishing Emails
Viaarxiv icon

Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction

Add code
Jun 10, 2022
Figure 1 for Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
Figure 2 for Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
Figure 3 for Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
Figure 4 for Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
Viaarxiv icon

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures

Add code
Apr 13, 2022
Figure 1 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 2 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 3 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 4 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Viaarxiv icon