Picture for Dorjan Hitaj

Dorjan Hitaj

Have You Poisoned My Data? Defending Neural Networks against Data Poisoning

Add code
Mar 20, 2024
Viaarxiv icon

Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem

Add code
Mar 06, 2024
Viaarxiv icon

OliVaR: Improving Olive Variety Recognition using Deep Neural Networks

Add code
Mar 01, 2023
Viaarxiv icon

Minerva: A File-Based Ransomware Detector

Add code
Jan 26, 2023
Viaarxiv icon

TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding

Add code
Feb 22, 2022
Figure 1 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Figure 2 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Figure 3 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Figure 4 for TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding
Viaarxiv icon

FedComm: Federated Learning as a Medium for Covert Communication

Add code
Jan 21, 2022
Figure 1 for FedComm: Federated Learning as a Medium for Covert Communication
Figure 2 for FedComm: Federated Learning as a Medium for Covert Communication
Figure 3 for FedComm: Federated Learning as a Medium for Covert Communication
Figure 4 for FedComm: Federated Learning as a Medium for Covert Communication
Viaarxiv icon

PassFlow: Guessing Passwords with Generative Flows

Add code
May 13, 2021
Figure 1 for PassFlow: Guessing Passwords with Generative Flows
Figure 2 for PassFlow: Guessing Passwords with Generative Flows
Figure 3 for PassFlow: Guessing Passwords with Generative Flows
Figure 4 for PassFlow: Guessing Passwords with Generative Flows
Viaarxiv icon

Reliable Detection of Compressed and Encrypted Data

Add code
Mar 31, 2021
Figure 1 for Reliable Detection of Compressed and Encrypted Data
Figure 2 for Reliable Detection of Compressed and Encrypted Data
Figure 3 for Reliable Detection of Compressed and Encrypted Data
Figure 4 for Reliable Detection of Compressed and Encrypted Data
Viaarxiv icon

Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training

Add code
Mar 05, 2021
Figure 1 for Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training
Figure 2 for Evaluating the Robustness of Geometry-Aware Instance-Reweighted Adversarial Training
Viaarxiv icon

Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks

Add code
Nov 04, 2020
Figure 1 for Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks
Figure 2 for Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks
Figure 3 for Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks
Figure 4 for Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks
Viaarxiv icon