Alert button
Picture for Erwin Quiring

Erwin Quiring

Alert button

The Impact of Uniform Inputs on Activation Sparsity and Energy-Latency Attacks in Computer Vision

Add code
Bookmark button
Alert button
Mar 27, 2024
Andreas Müller, Erwin Quiring

Viaarxiv icon

On the Detection of Image-Scaling Attacks in Machine Learning

Add code
Bookmark button
Alert button
Oct 23, 2023
Erwin Quiring, Andreas Müller, Konrad Rieck

Viaarxiv icon

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

Add code
Bookmark button
Alert button
Mar 25, 2023
Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck

Figure 1 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 2 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 3 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 4 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Viaarxiv icon

I still know it's you! On Challenges in Anonymizing Source Code

Add code
Bookmark button
Alert button
Aug 26, 2022
Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck

Figure 1 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 2 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 3 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 4 for I still know it's you! On Challenges in Anonymizing Source Code
Viaarxiv icon

Misleading Deep-Fake Detection with GAN Fingerprints

Add code
Bookmark button
Alert button
May 25, 2022
Vera Wesselkamp, Konrad Rieck, Daniel Arp, Erwin Quiring

Figure 1 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 2 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 3 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 4 for Misleading Deep-Fake Detection with GAN Fingerprints
Viaarxiv icon

Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification

Add code
Bookmark button
Alert button
Oct 19, 2020
Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad Rieck

Figure 1 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 2 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 3 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 4 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Viaarxiv icon

Dos and Don'ts of Machine Learning in Computer Security

Add code
Bookmark button
Alert button
Oct 19, 2020
Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck

Figure 1 for Dos and Don'ts of Machine Learning in Computer Security
Figure 2 for Dos and Don'ts of Machine Learning in Computer Security
Figure 3 for Dos and Don'ts of Machine Learning in Computer Security
Figure 4 for Dos and Don'ts of Machine Learning in Computer Security
Viaarxiv icon

Backdooring and Poisoning Neural Networks with Image-Scaling Attacks

Add code
Bookmark button
Alert button
Mar 19, 2020
Erwin Quiring, Konrad Rieck

Figure 1 for Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Figure 2 for Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Figure 3 for Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Figure 4 for Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Viaarxiv icon

Misleading Authorship Attribution of Source Code using Adversarial Learning

Add code
Bookmark button
Alert button
May 31, 2019
Erwin Quiring, Alwin Maier, Konrad Rieck

Figure 1 for Misleading Authorship Attribution of Source Code using Adversarial Learning
Figure 2 for Misleading Authorship Attribution of Source Code using Adversarial Learning
Figure 3 for Misleading Authorship Attribution of Source Code using Adversarial Learning
Figure 4 for Misleading Authorship Attribution of Source Code using Adversarial Learning
Viaarxiv icon

Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking

Add code
Bookmark button
Alert button
Mar 16, 2017
Erwin Quiring, Daniel Arp, Konrad Rieck

Figure 1 for Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking
Figure 2 for Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking
Figure 3 for Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking
Figure 4 for Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking
Viaarxiv icon