Arp, Daniel J.
305  results:
Search for persons X
?
1

Listening Between the Bits: Privacy Leaks in Audio Fingerpr..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
Pfister, Moritz ; Michael, Robert ; Boll, Max... - p. 184-204 , 2024
 
?
3

Drift Forensics of Malware Classifiers:

, In: Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security,
Chow, Theo ; Kan, Zeliang ; Linhardt, Lorenz... - p. 197-207 , 2023
 
?
4

Misleading Deep-Fake Detection with GAN Fingerprints:

, In: 2022 IEEE Security and Privacy Workshops (SPW),
Wesselkamp, Vera ; Rieck, Konrad ; Arp, Daniel. - p. 59-65 , 2022
 
?
5

Quantifying the Risk of Wormhole Attacks on Bluetooth Conta..:

, In: Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy,
Czybik, Stefan ; Arp, Daniel ; Rieck, Konrad - p. 264-275 , 2022
 
?
6

Spying through Virtual Backgrounds of Video Calls:

, In: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security,
 
?
7

Evaluating Explanation Methods for Deep Learning in Securit:

, In: 2020 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
 
?
9

Yes, Machine Learning Can Be More Secure! A Case Study on A..:

Demontis, Ambra ; Melis, Marco ; Biggio, Battista...
IEEE Transactions on Dependable and Secure Computing.  16 (2019)  4 - p. 711-724 , 2019
 
?
10

Forgotten Siblings: Unifying Attacks on Machine Learning an..:

, In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P),
Quiring, Erwin ; Arp, Daniel ; Rieck, Konrad - p. 488-502 , 2018
 
?
11

Mining Attributed Graphs for Threat Intelligence:

, In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy,
Gascon, Hugo ; Grobauer, Bernd ; Schreck, Thomas... - p. 15-22 , 2017
 
?
13

Privacy Threats through Ultrasonic Side Channels on Mobile ..:

, In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
14

VCCFinder : Finding Potential Vulnerabilities in Open-So..:

, In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,
Perl, Henning ; Dechand, Sergej ; Smith, Matthew... - p. 426-437 , 2015
 
1-15