Author of the publication

FaceHack: Attacking Facial Recognition Systems Using Malicious Facial Characteristics.

, , , , and . IEEE Trans. Biom. Behav. Identity Sci., 4 (3): 361-372 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TERMinator Suite: Benchmarking Privacy-Preserving Architectures., , and . IACR Cryptology ePrint Archive, (2017)Extending residue-based fault tolerance to encrypted computation., and . ITC, page 1-10. IEEE, (2015)Privilege escalation attack through address space identifier corruption in untrusted modern processors.. DTIS, page 161-166. IEEE, (2013)Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering., , and . CPSS@AsiaCCS, page 15-20. ACM, (2017)A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation., and . CPS-SPC@CCS, page 81-92. ACM, (2016)Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining., , , and . CPSIOTSEC@CCS, page 31-36. ACM, (2020)ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code., , and . CPSS@AsiaCCS, page 60-71. ACM, (2023)Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications., , , , and . CPSIOTSEC@CCS, page 83-89. ACM, (2023)Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware., , , and . EuroS&P, page 369-384. IEEE, (2021)Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic., , , and . ICCAD, page 100:1-100:9. ACM, (2022)