Search Results for author: Erwin Quiring

Found 11 papers, 7 papers with code

AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images

no code implementations22 Apr 2024 Jonas Ricker, Dennis Assenmacher, Thorsten Holz, Asja Fischer, Erwin Quiring

Recent advances in the field of generative artificial intelligence (AI) have blurred the lines between authentic and machine-generated content, making it almost impossible for humans to distinguish between such media.

The Impact of Uniform Inputs on Activation Sparsity and Energy-Latency Attacks in Computer Vision

1 code implementation27 Mar 2024 Andreas Müller, Erwin Quiring

We empirically examine our findings in a comprehensive evaluation with multiple image classification models and show that our attack achieves the same sparsity effect as prior sponge-example methods, but at a fraction of computation effort.

Image Classification

On the Detection of Image-Scaling Attacks in Machine Learning

1 code implementation23 Oct 2023 Erwin Quiring, Andreas Müller, Konrad Rieck

Unfortunately, this preprocessing step is vulnerable to so-called image-scaling attacks where an attacker makes unnoticeable changes to an image so that it becomes a new image after scaling.

I still know it's you! On Challenges in Anonymizing Source Code

1 code implementation26 Aug 2022 Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck

We prove that the task of generating a $k$-anonymous program -- a program that cannot be attributed to one of $k$ authors -- is not computable in the general case.

Misleading Deep-Fake Detection with GAN Fingerprints

1 code implementation25 May 2022 Vera Wesselkamp, Konrad Rieck, Daniel Arp, Erwin Quiring

In particular, we show that an adversary can remove indicative artifacts, the GAN fingerprint, directly from the frequency spectrum of a generated image.

Dos and Don'ts of Machine Learning in Computer Security

no code implementations19 Oct 2020 Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck

With the growing processing power of computing systems and the increasing availability of massive datasets, machine learning algorithms have led to major breakthroughs in many different areas.

BIG-bench Machine Learning Computer Security +1

Backdooring and Poisoning Neural Networks with Image-Scaling Attacks

no code implementations19 Mar 2020 Erwin Quiring, Konrad Rieck

By combining poisoning and image-scaling attacks, we can conceal the trigger of backdoors as well as hide the overlays of clean-label poisoning.

Misleading Authorship Attribution of Source Code using Adversarial Learning

1 code implementation29 May 2019 Erwin Quiring, Alwin Maier, Konrad Rieck

In this paper, we present a novel attack against authorship attribution of source code.

Authorship Attribution

Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking

no code implementations16 Mar 2017 Erwin Quiring, Daniel Arp, Konrad Rieck

This problem has motivated the research field of adversarial machine learning that is concerned with attacking and defending learning methods.

Autonomous Driving BIG-bench Machine Learning +3

Cannot find the paper you are looking for? You can Submit a new open access paper.