Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Butler, Kevin R."'
Autor:
Gibson, Cassidy, Olszewski, Daniel, Brigham, Natalie Grace, Crowder, Anna, Butler, Kevin R. B., Traynor, Patrick, Redmiles, Elissa M., Kohno, Tadayoshi
Given a source image of a clothed person (an image subject), AI-based nudification applications can produce nude (undressed) images of that person. Moreover, not only do such applications exist, but there is ample evidence of the use of such applicat
Externí odkaz:
http://arxiv.org/abs/2411.09751
Autor:
Sheldon, Jennifer, Zhu, Weidong, Abdullah, Adnan, Bhupathiraju, Sri Hrushikesh Varma, Sugawara, Takeshi, Butler, Kevin R. B., Islam, Md Jahidul, Rampazzi, Sara
Underwater datacenters (UDCs) hold promise as next-generation data storage due to their energy efficiency and environmental sustainability benefits. While the natural cooling properties of water save power, the isolated aquatic environment and long-r
Externí odkaz:
http://arxiv.org/abs/2404.11815
Providing security guarantees for embedded devices with limited interface capabilities is an increasingly crucial task. Although these devices don't have traditional interfaces, they still generate unintentional electromagnetic signals that correlate
Externí odkaz:
http://arxiv.org/abs/2206.10746
Autor:
Elgharabawy, Mounir, Kojusner, Blas, Mannan, Mohammad, Butler, Kevin R. B., Williams, Byron, Youssef, Amr
The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by pr
Externí odkaz:
http://arxiv.org/abs/2204.01516
Designing deep networks robust to adversarial examples remains an open problem. Likewise, recent zeroth order hard-label attacks on image classification models have shown comparable performance to their first-order, gradient-level alternatives. It wa
Externí odkaz:
http://arxiv.org/abs/2103.03325
Autor:
Zhao, Lianying, Choi, Joseph I., Demirag, Didem, Butler, Kevin R. B., Mannan, Mohammad, Ayday, Erman, Clark, Jeremy
A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other i
Externí odkaz:
http://arxiv.org/abs/1907.00935
Autor:
Choi, Joseph I., Tian, Dave 'Jing', Hernandez, Grant, Patton, Christopher, Mood, Benjamin, Shrimpton, Thomas, Butler, Kevin R. B., Traynor, Patrick
A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ an
Externí odkaz:
http://arxiv.org/abs/1905.01233
Autor:
Abdullah, Hadi, Garcia, Washington, Peeters, Christian, Traynor, Patrick, Butler, Kevin R. B., Wilson, Joseph
Publikováno v:
The Network and Distributed System Security Symposium (NDSS) 2019
Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demons
Externí odkaz:
http://arxiv.org/abs/1904.05734
Establishing unique identities for both humans and end systems has been an active research problem in the security community, giving rise to innovative machine learning-based authentication techniques. Although such techniques offer an automated meth
Externí odkaz:
http://arxiv.org/abs/1810.00024
The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exp
Externí odkaz:
http://arxiv.org/abs/1708.09114