Search Results for author: Wenke Lee

Found 5 papers, 3 papers with code

The Threat of Offensive AI to Organizations

no code implementations30 Jun 2021 Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio

Although offensive AI has been discussed in the past, there is a need to analyze and understand the threat in the context of organizations.

Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats

1 code implementation24 Jul 2020 Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran

Our game model has imperfect information as the players do not have information about the actions of the opponent.

Computer Science and Game Theory Cryptography and Security

The Creation and Detection of Deepfakes: A Survey

no code implementations23 Apr 2020 Yisroel Mirsky, Wenke Lee

Generative deep learning algorithms have progressed to a point where it is difficult to tell the difference between what is real and what is fake.

Misinformation

Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages

1 code implementation4 Feb 2020 Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee

We outline the challenges of tailoring program analysis tools to interpreted languages and release our pipeline as a reference point for the community to build on and help in securing the software supply chain.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.