no code implementations • 15 Feb 2024 • David Noever, Forrest McKee
This investigation reveals a novel exploit derived from PNG image file formats, specifically their alpha transparency layer, and its potential to fool multiple AI vision systems.
no code implementations • 29 Jan 2024 • Forrest McKee, David Noever
A notable attack limitation stems from its dependency on the background (hidden) layer in grayscale as a rough match to the transparent foreground image that the human eye perceives.
no code implementations • 23 Nov 2023 • Forrest McKee, David Noever
In this study, we investigate the emerging threat of inaudible acoustic attacks targeting digital voice assistants, a critical concern given their projected prevalence to exceed the global population by 2024.
no code implementations • 23 Jul 2023 • Forrest McKee, David Noever
The paper applies reinforcement learning to novel Internet of Thing configurations.
no code implementations • 25 Apr 2023 • Forrest McKee, David Noever
This study investigates a primary inaudible attack vector on Amazon Alexa voice services using near ultrasound trojans and focuses on characterizing the attack surface and examining the practical implications of issuing inaudible voice commands.
no code implementations • 31 Jan 2023 • David Noever, Forrest McKee
Large language models (LLM) such as OpenAI's ChatGPT and GPT-3 offer unique testbeds for exploring the translation challenges of turning literacy into numeracy.
no code implementations • 10 Jan 2023 • Forrest McKee, David Noever
The paper illustrates ten diverse tasks that a conversational agent or large language model might answer appropriately to the effects of command-line attacker.
no code implementations • 1 Jan 2023 • David Noever, Forrest McKee
The research introduces four novel cases where the chatbot fields the questions, asks the questions, both question-answer roles, and finally tries to guess appropriate contextual emotions.
no code implementations • 18 Dec 2022 • Forrest McKee, David Noever
Question-and-answer formats provide a novel experimental platform for investigating cybersecurity questions.