Search Results for author: Shirin Nilizadeh

Found 6 papers, 1 papers with code

StyleGAN as a Utility-Preserving Face De-identification Method

no code implementations5 Dec 2022 Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh

Several face de-identification methods have been proposed to preserve users' privacy by obscuring their faces.

De-identification Face Detection

Evaluating the effectiveness of Phishing Reports on Twitter

no code implementations13 Nov 2021 Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh

Moreover, nearly 31% of these URLs were still active even after a week of them being reported, with 27% of them being detected by very few anti-phishing tools, suggesting that a large majority of these reports remain undiscovered, despite the majority of the follower base of these accounts being security focused users.

Audio Attacks and Defenses against AED Systems -- A Practical Study

no code implementations14 Jun 2021 Rodrigo dos Santos, Shirin Nilizadeh

We show that an adversary can focus on audio adversarial inputs to cause AED systems to misclassify, achieving high success rates, even when we use small levels of a given type of noisy disturbance.

Audio Denoising Denoising +3

DifFuzz: Differential Fuzzing for Side-Channel Analysis

2 code implementations16 Nov 2018 Shirin Nilizadeh, Yannic Noller, Corina S. Pasareanu

For this paper, we present an implementation that targets analysis of Java programs, and uses and extends the Kelinci and AFL fuzzers.

Cryptography and Security Software Engineering

Cannot find the paper you are looking for? You can Submit a new open access paper.