Picture for Konrad Rieck

Konrad Rieck

Manipulating Feature Visualizations with Gradient Slingshots

Add code
Jan 11, 2024
Figure 1 for Manipulating Feature Visualizations with Gradient Slingshots
Figure 2 for Manipulating Feature Visualizations with Gradient Slingshots
Figure 3 for Manipulating Feature Visualizations with Gradient Slingshots
Figure 4 for Manipulating Feature Visualizations with Gradient Slingshots
Viaarxiv icon

On the Detection of Image-Scaling Attacks in Machine Learning

Add code
Oct 23, 2023
Viaarxiv icon

Learning Type Inference for Enhanced Dataflow Analysis

Add code
Oct 04, 2023
Viaarxiv icon

Evil from Within: Machine Learning Backdoors through Hardware Trojans

Add code
Apr 18, 2023
Figure 1 for Evil from Within: Machine Learning Backdoors through Hardware Trojans
Figure 2 for Evil from Within: Machine Learning Backdoors through Hardware Trojans
Figure 3 for Evil from Within: Machine Learning Backdoors through Hardware Trojans
Figure 4 for Evil from Within: Machine Learning Backdoors through Hardware Trojans
Viaarxiv icon

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

Add code
Mar 25, 2023
Viaarxiv icon

I still know it's you! On Challenges in Anonymizing Source Code

Add code
Aug 26, 2022
Figure 1 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 2 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 3 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 4 for I still know it's you! On Challenges in Anonymizing Source Code
Viaarxiv icon

Misleading Deep-Fake Detection with GAN Fingerprints

Add code
May 25, 2022
Figure 1 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 2 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 3 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 4 for Misleading Deep-Fake Detection with GAN Fingerprints
Viaarxiv icon

Machine Unlearning of Features and Labels

Add code
Aug 26, 2021
Figure 1 for Machine Unlearning of Features and Labels
Figure 2 for Machine Unlearning of Features and Labels
Figure 3 for Machine Unlearning of Features and Labels
Figure 4 for Machine Unlearning of Features and Labels
Viaarxiv icon

Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification

Add code
Oct 19, 2020
Figure 1 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 2 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 3 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 4 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Viaarxiv icon

Dos and Don'ts of Machine Learning in Computer Security

Add code
Oct 19, 2020
Figure 1 for Dos and Don'ts of Machine Learning in Computer Security
Figure 2 for Dos and Don'ts of Machine Learning in Computer Security
Figure 3 for Dos and Don'ts of Machine Learning in Computer Security
Figure 4 for Dos and Don'ts of Machine Learning in Computer Security
Viaarxiv icon