Leveraging Frequency Analysis for Deep Fake Image Recognition J Frank, T Eisenhofer, L Schönherr, A Fischer, D Kolossa, T Holz Thirty-seventh International Conference on Machine Learning (ICML 2020), 2020 | 114 | 2020 |
EthBMC: A Bounded Model Checker for Smart Contracts J Frank, C Aschermann, T Holz 29th USENIX Security Symposium (USENIX Security 20), 2020 | 39 | 2020 |
SDN-Guard: Protecting SDN controllers against SDN rootkits D Tatang, F Quinkert, J Frank, C Röpke, T Holz 2017 IEEE Conference on Network Function Virtualization and Software Defined …, 2017 | 34 | 2017 |
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ... 29th USENIX Security Symposium (USENIX Security 20), 2020 | 18 | 2020 |
Dompteur: Taming Audio Adversarial Examples T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz 30th USENIX Security Symposium (USENIX Security 21), 2021 | 7 | 2021 |
WaveFake: A Data Set to Facilitate Audio Deepfake Detection J Frank, L Schönherr Thirty-fifth Conference on Neural Information Processing Systems (NeurIPS …, 2021 | 6 | 2021 |
[RE] CNN-generated images are surprisingly easy to spot... for now J Frank, T Holz arXiv preprint arXiv:2104.02984, 2021 | | 2021 |
Efficient Calculation of Adversarial Examples for Bayesian Neural Networks S Däubener, J Frank, T Holz, A Fischer | | 2021 |