Joel Frank
Zitiert von
Zitiert von
Leveraging Frequency Analysis for Deep Fake Image Recognition
J Frank, T Eisenhofer, L Schönherr, A Fischer, D Kolossa, T Holz
Thirty-seventh International Conference on Machine Learning (ICML 2020), 2020
EthBMC: A Bounded Model Checker for Smart Contracts
J Frank, C Aschermann, T Holz
29th USENIX Security Symposium (USENIX Security 20), 2020
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
J Frank, L Schönherr
Thirty-fifth Conference on Neural Information Processing Systems (NeurIPS …, 2021
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ...
29th USENIX Security Symposium (USENIX Security 20), 2020
SDN-Guard: Protecting SDN controllers against SDN rootkits
D Tatang, F Quinkert, J Frank, C Röpke, T Holz
2017 IEEE Conference on Network Function Virtualization and Software Defined …, 2017
Dompteur: Taming Audio Adversarial Examples
T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz
30th USENIX Security Symposium (USENIX Security 21), 2021
A Representative Study on Human Detection of Artificially Generated Media Across Countries
J Frank, F Herbert, J Ricker, L Schönherr, T Eisenhofer, A Fischer, ...
2024 IEEE Symposium on Security and Privacy (SP), 2023
[RE] CNN-generated images are surprisingly easy to spot... for now
J Frank, T Holz
arXiv preprint arXiv:2104.02984, 2021
Efficient Calculation of Adversarial Examples for Bayesian Neural Networks
S Däubener, J Frank, T Holz, A Fischer
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–9