Author of the publication

FaceHack: Attacking Facial Recognition Systems Using Malicious Facial Characteristics.

, , , , and . IEEE Trans. Biom. Behav. Identity Sci., 4 (3): 361-372 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications., , and . USENIX Security Symposium, page 2847-2862. USENIX Association, (2021)Image reconstruction attacks on distributed machine learning models., and . DistributedML@CoNEXT, page 29-35. ACM, (2021)Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications., , , , and . CPSIOTSEC@CCS, page 83-89. ACM, (2023)Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure., , , , , and . Trans. Emerg. Telecommun. Technol., (2022)SNIFU: Secure Network Interception for Firmware Updates in legacy PLCs., , , and . VTS, page 1-6. IEEE, (2020)Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations., , , , , , and . SP, page 2068-2085. IEEE, (2023)I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems., , and . AsiaCCS, page 744-758. ACM, (2020)FaceHack: Attacking Facial Recognition Systems Using Malicious Facial Characteristics., , , , and . IEEE Trans. Biom. Behav. Identity Sci., 4 (3): 361-372 (2022)VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks., , , , , , , and . CHI, page 835:1-835:17. ACM, (2024)