Search Results for author: Salil Kanhere

Found 3 papers, 0 papers with code

PhishClone: Measuring the Efficacy of Cloning Evasion Attacks

no code implementations4 Sep 2022 Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere

We then reported our sites to VirusTotal and other platforms, with regular polling of results for 7 days, to ascertain the efficacy of each cloning technique.

PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

no code implementations21 Mar 2022 Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil Kanhere

Existing integrity verification approaches for deep models are designed for private verification (i. e., assuming the service provider is honest, with white-box access to model parameters).

Model Compression

TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

no code implementations15 Mar 2022 Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere

Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders.

Cannot find the paper you are looking for? You can Submit a new open access paper.