Alert button
Picture for Konrad Rieck

Konrad Rieck

Alert button

Manipulating Feature Visualizations with Gradient Slingshots

Add code
Bookmark button
Alert button
Jan 11, 2024
Dilyara Bareeva, Marina M. -C. Höhne, Alexander Warnecke, Lukas Pirch, Klaus-Robert Müller, Konrad Rieck, Kirill Bykov

Viaarxiv icon

On the Detection of Image-Scaling Attacks in Machine Learning

Add code
Bookmark button
Alert button
Oct 23, 2023
Erwin Quiring, Andreas Müller, Konrad Rieck

Viaarxiv icon

Learning Type Inference for Enhanced Dataflow Analysis

Add code
Bookmark button
Alert button
Oct 04, 2023
Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi

Figure 1 for Learning Type Inference for Enhanced Dataflow Analysis
Figure 2 for Learning Type Inference for Enhanced Dataflow Analysis
Figure 3 for Learning Type Inference for Enhanced Dataflow Analysis
Figure 4 for Learning Type Inference for Enhanced Dataflow Analysis
Viaarxiv icon

Evil from Within: Machine Learning Backdoors through Hardware Trojans

Add code
Bookmark button
Alert button
Apr 18, 2023
Alexander Warnecke, Julian Speith, Jan-Niklas Möller, Konrad Rieck, Christof Paar

Figure 1 for Evil from Within: Machine Learning Backdoors through Hardware Trojans
Figure 2 for Evil from Within: Machine Learning Backdoors through Hardware Trojans
Figure 3 for Evil from Within: Machine Learning Backdoors through Hardware Trojans
Figure 4 for Evil from Within: Machine Learning Backdoors through Hardware Trojans
Viaarxiv icon

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

Add code
Bookmark button
Alert button
Mar 25, 2023
Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck

Figure 1 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 2 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 3 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Figure 4 for No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Viaarxiv icon

I still know it's you! On Challenges in Anonymizing Source Code

Add code
Bookmark button
Alert button
Aug 26, 2022
Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck

Figure 1 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 2 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 3 for I still know it's you! On Challenges in Anonymizing Source Code
Figure 4 for I still know it's you! On Challenges in Anonymizing Source Code
Viaarxiv icon

Misleading Deep-Fake Detection with GAN Fingerprints

Add code
Bookmark button
Alert button
May 25, 2022
Vera Wesselkamp, Konrad Rieck, Daniel Arp, Erwin Quiring

Figure 1 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 2 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 3 for Misleading Deep-Fake Detection with GAN Fingerprints
Figure 4 for Misleading Deep-Fake Detection with GAN Fingerprints
Viaarxiv icon

Machine Unlearning of Features and Labels

Add code
Bookmark button
Alert button
Aug 26, 2021
Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck

Figure 1 for Machine Unlearning of Features and Labels
Figure 2 for Machine Unlearning of Features and Labels
Figure 3 for Machine Unlearning of Features and Labels
Figure 4 for Machine Unlearning of Features and Labels
Viaarxiv icon

Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification

Add code
Bookmark button
Alert button
Oct 19, 2020
Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad Rieck

Figure 1 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 2 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 3 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Figure 4 for Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
Viaarxiv icon

Dos and Don'ts of Machine Learning in Computer Security

Add code
Bookmark button
Alert button
Oct 19, 2020
Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck

Figure 1 for Dos and Don'ts of Machine Learning in Computer Security
Figure 2 for Dos and Don'ts of Machine Learning in Computer Security
Figure 3 for Dos and Don'ts of Machine Learning in Computer Security
Figure 4 for Dos and Don'ts of Machine Learning in Computer Security
Viaarxiv icon