no code implementations • 4 Sep 2022 • Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere
We then reported our sites to VirusTotal and other platforms, with regular polling of results for 7 days, to ascertain the efficacy of each cloning technique.
no code implementations • 21 Mar 2022 • Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil Kanhere
Existing integrity verification approaches for deep models are designed for private verification (i. e., assuming the service provider is honest, with white-box access to model parameters).
no code implementations • 15 Mar 2022 • Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere
Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders.