Search Results for author: Rachel Greenstadt

Found 6 papers, 1 papers with code

Can deepfakes be created by novice users?

no code implementations28 Apr 2023 Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt

We conclude that creating Deepfakes is a simple enough task for a novice user given adequate tools and time; however, the resulting Deepfakes are not sufficiently real-looking and are unable to completely fool detection software as well as human examiners

DeepFake Detection Face Swapping

Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

no code implementations30 Jan 2020 Yigit Alparslan, Ken Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt

Next, we craft a variety of different black-box attack algorithms on a facial image dataset assuming minimal adversarial knowledge, to further assess the robustness of DNNs in facial recognition.

Autonomous Vehicles

Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments

no code implementations20 Jan 2017 Edwin Dauber, Aylin Caliskan, Richard Harang, Gregory Shearer, Michael Weisman, Frederica Nelson, Rachel Greenstadt

We show that we can also use these calibration curves in the case that we do not have linking information and thus are forced to classify individual samples directly.

Authorship Attribution

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

3 code implementations28 Dec 2015 Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan

Many distinguishing features present in source code, e. g. variable names, are removed in the compilation process, and compiler optimization may alter the structure of a program, further obscuring features that are known to be useful in determining authorship.

Cryptography and Security

Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location

no code implementations29 Mar 2015 Lex Fridman, Steven Weber, Rachel Greenstadt, Moshe Kam

Active authentication is the problem of continuously verifying the identity of a person based on behavioral aspects of their interaction with a computing device.

Cannot find the paper you are looking for? You can Submit a new open access paper.