no code implementations • 5 Sep 2023 • Priyanka Bose, Dipanjan Das, Fabio Gritti, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna
Yet, there are sophisticated actors who turn their domain knowledge and market inefficiencies to their strategic advantage; thus extracting value from trades not accessible to others.
2 code implementations • 2 Jun 2023 • Xuandong Zhao, Kexun Zhang, Zihao Su, Saastha Vasan, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna, Yu-Xiang Wang, Lei LI
However, if we do not require the watermarked image to look the same as the original one, watermarks that keep the image semantically similar can be an alternative defense against our attack.
1 code implementation • 6 Jan 2023 • Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim
To achieve this, prior attacks explicitly inject the insecure code payload into the training data, making the poison data detectable by static analysis tools that can remove such malicious data from the training set.
1 code implementation • 21 Oct 2020 • Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
In a more realistic scenario, when the target audio waveform is played over the air in different rooms, VENOMAVE maintains a success rate of up to 73. 3%.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +3
1 code implementation • 1 May 2020 • Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna
Our attack, Bullseye Polytope, improves the attack success rate of the current state-of-the-art by 26. 75% in end-to-end transfer learning, while increasing attack speed by a factor of 12.
no code implementations • 25 May 2018 • Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna
These results indicate that GANs can be effective for text classification tasks.
no code implementations • WWW '10: Proceedings of the 19th international conference on World wide web 2010 • Marco Cova, Christopher Kruegel, Giovanni Vigna
Our approach combines anomaly detection with emulation to automatically identify malicious Java- Script code and to support its analysis.