Folgen
Joel Frank
Titel
Zitiert von
Zitiert von
Jahr
Leveraging Frequency Analysis for Deep Fake Image Recognition
J Frank, T Eisenhofer, L Schönherr, A Fischer, D Kolossa, T Holz
Thirty-seventh International Conference on Machine Learning (ICML 2020), 2020
1262020
EthBMC: A Bounded Model Checker for Smart Contracts
J Frank, C Aschermann, T Holz
29th USENIX Security Symposium (USENIX Security 20), 2020
462020
SDN-Guard: Protecting SDN controllers against SDN rootkits
D Tatang, F Quinkert, J Frank, C Röpke, T Holz
2017 IEEE Conference on Network Function Virtualization and Software Defined …, 2017
362017
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ...
29th USENIX Security Symposium (USENIX Security 20), 2020
212020
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
J Frank, L Schönherr
Thirty-fifth Conference on Neural Information Processing Systems (NeurIPS …, 2021
82021
Dompteur: Taming Audio Adversarial Examples
T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz
30th USENIX Security Symposium (USENIX Security 21), 2021
82021
[RE] CNN-generated images are surprisingly easy to spot... for now
J Frank, T Holz
arXiv preprint arXiv:2104.02984, 2021
2021
Efficient Calculation of Adversarial Examples for Bayesian Neural Networks
S Däubener, J Frank, T Holz, A Fischer
2021
Dompteur: Taming Audio Adversarial Examples Download PDF
T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–9