Follow
Joel Frank
Title
Cited by
Cited by
Year
Leveraging Frequency Analysis for Deep Fake Image Recognition
J Frank, T Eisenhofer, L Schönherr, A Fischer, D Kolossa, T Holz
Thirty-seventh International Conference on Machine Learning (ICML 2020), 2020
1142020
EthBMC: A Bounded Model Checker for Smart Contracts
J Frank, C Aschermann, T Holz
29th USENIX Security Symposium (USENIX Security 20), 2020
392020
SDN-Guard: Protecting SDN controllers against SDN rootkits
D Tatang, F Quinkert, J Frank, C Röpke, T Holz
2017 IEEE Conference on Network Function Virtualization and Software Defined …, 2017
342017
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ...
29th USENIX Security Symposium (USENIX Security 20), 2020
182020
Dompteur: Taming Audio Adversarial Examples
T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz
30th USENIX Security Symposium (USENIX Security 21), 2021
72021
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
J Frank, L Schönherr
Thirty-fifth Conference on Neural Information Processing Systems (NeurIPS …, 2021
62021
[RE] CNN-generated images are surprisingly easy to spot... for now
J Frank, T Holz
arXiv preprint arXiv:2104.02984, 2021
2021
Efficient Calculation of Adversarial Examples for Bayesian Neural Networks
S Däubener, J Frank, T Holz, A Fischer
2021
The system can't perform the operation now. Try again later.
Articles 1–8