Alert button
Picture for Rachel Greenstadt

Rachel Greenstadt

Alert button

Can deepfakes be created by novice users?

Add code
Bookmark button
Alert button
Apr 28, 2023
Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt

Figure 1 for Can deepfakes be created by novice users?
Figure 2 for Can deepfakes be created by novice users?
Figure 3 for Can deepfakes be created by novice users?
Figure 4 for Can deepfakes be created by novice users?
Viaarxiv icon

Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

Add code
Bookmark button
Alert button
Jan 30, 2020
Yigit Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt

Figure 1 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 2 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 3 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 4 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Viaarxiv icon

Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments

Add code
Bookmark button
Alert button
Mar 16, 2017
Edwin Dauber, Aylin Caliskan, Richard Harang, Rachel Greenstadt

Figure 1 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 2 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 3 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 4 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Viaarxiv icon

Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location

Add code
Bookmark button
Alert button
Mar 29, 2015
Lex Fridman, Steven Weber, Rachel Greenstadt, Moshe Kam

Figure 1 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Figure 2 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Figure 3 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Figure 4 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Viaarxiv icon