关注
Joel Frank
标题
引用次数
引用次数
年份
Leveraging Frequency Analysis for Deep Fake Image Recognition
J Frank, T Eisenhofer, L Schönherr, A Fischer, D Kolossa, T Holz
Thirty-seventh International Conference on Machine Learning (ICML 2020), 2020
5162020
EthBMC: A Bounded Model Checker for Smart Contracts
J Frank, C Aschermann, T Holz
29th USENIX Security Symposium (USENIX Security 20), 2020
1502020
WaveFake: A Data Set to Facilitate Audio Deepfake Detection
J Frank, L Schönherr
Thirty-fifth Conference on Neural Information Processing Systems (NeurIPS …, 2021
912021
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ...
29th USENIX Security Symposium (USENIX Security 20), 2020
592020
SDN-Guard: Protecting SDN controllers against SDN rootkits
D Tatang, F Quinkert, J Frank, C Röpke, T Holz
2017 IEEE Conference on Network Function Virtualization and Software Defined …, 2017
572017
Dompteur: Taming Audio Adversarial Examples
T Eisenhofer, L Schönherr, J Frank, L Speckemeier, D Kolossa, T Holz
30th USENIX Security Symposium (USENIX Security 21), 2021
352021
A Representative Study on Human Detection of Artificially Generated Media Across Countries
J Frank, F Herbert, J Ricker, L Schönherr, T Eisenhofer, A Fischer, ...
2024 IEEE Symposium on Security and Privacy (SP), 2023
32023
[RE] CNN-generated images are surprisingly easy to spot... for now
J Frank, T Holz
arXiv preprint arXiv:2104.02984, 2021
32021
Efficient Calculation of Adversarial Examples for Bayesian Neural Networks
S Däubener, J Frank, T Holz, A Fischer
22021
Impact of antiretroviral treatment on.
M Banasch, J Frank, K Serova, K Knyhala, S Kollar, A Potthoff, ...
HIV Medicine 12 (1), 2011
2011
系统目前无法执行此操作,请稍后再试。
文章 1–10