Briland Hitaj
Titel
Geciteerd door
Geciteerd door
Jaar
Deep models under the GAN: information leakage from collaborative deep learning
B Hitaj, G Ateniese, F Perez-Cruz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
4962017
Passgan: A deep learning approach for password guessing
B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
International Conference on Applied Cryptography and Network Security, 217-237, 2019
1242019
No place to hide that bytes won’t reveal: Sniffing location-based encrypted traffic to track a user’s position
G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani
International Conference on Network and System Security, 46-59, 2015
162015
Evasion attacks against watermarking techniques found in mlaas systems
D Hitaj, B Hitaj, LV Mancini
2019 Sixth International Conference on Software Defined Systems (SDS), 55-63, 2019
112019
Scratch that! An evolution-based adversarial attack against neural networks
M Jere, L Rossi, B Hitaj, G Ciocarlie, G Boracchi, F Koushanfar
arXiv preprint arXiv:1912.02316, 2019
72019
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks
D Hitaj, B Hitaj, S Jajodia, LV Mancini
IEEE Intelligent Systems, 2020
12020
What are GANs useful for?
B Hitaj, PM Olmos, P Gasti, G Ateniese, F Pérez-Cruz
1
System and process for generating passwords or password guesses
B Hitaj, G Ateniese, F Perez-Cruz, P Gasti
US Patent App. 16/557,416, 2020
2020
WHAT ARE GANS USEFUL FOR?
PM Olmos, B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
2018
Applying Mobile Technology for a Pervasive University Information System
B Hitaj, I Hakrama
2013
Vice Chair/Registration
A Cárdenas, M Gondree, R Bobba, B Hitaj, B Copos, I Agadakos, ...
Using Gravitational Force in Terrain Optimization Problems
E Terolli, B Hitaj, O Altun
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–12