Olga Taran,Joakim Tutt,Taras Holotyak et al.
Olga Taran et al.
In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the sec...
"Alexa, What's a Phishing Email?": Training users to spot phishing emails using a voice assistant [0.03%]
“Alexa,什么是钓鱼邮件? ”:使用语音助手训练用户识别钓鱼邮件
Filipo Sharevski,Peter Jachim
Filipo Sharevski
This paper reports the findings from an empirical study investigating the effectiveness of using intelligent voice assistants, Amazon Alexa in our case, to deliver a phishing training to users. Because intelligent voice assistants can hardl...
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation [0.03%]
戴着加密眼镜的机器学习:通过基于密钥的多样化聚合对抗对抗性攻击
Olga Taran,Shideh Rezaeifar,Taras Holotyak et al.
Olga Taran et al.
In recent years, classification techniques based on deep neural networks (DNN) were widely used in many fields such as computer vision, natural language processing, and self-driving cars. However, the vulnerability of the DNN-based classifi...