Camcorder piracy refers to the process of using a camcorder to record a screen that displays copyrighted content. In contrast to the previous works that aimed at detecting the occurrence of camcorder piracy, this paper conducts an in-depth study of the luminance flicker that is naturally present in camcorded videos due to the interplay between a liquid-crystal-d…
We report a new neural backdoor attack, named Hibernated Backdoor, which is stealthy, aggressive and devastating. The backdoor is planted in a hibernated mode to avoid being detected. Once deployed and fine-tuned on end devices, the hibernated backdoor turns into the active state that can be exploited by the attacker. To the best of our knowledge, this is the fi…
"The geographic data and timestamps of subscribers held by mobile carriers have long been used by law enforcement and intelligence agencies to conduct legal investigations, largescale surveillance, or even unconstitutional search. Meanwhile, with the surge in popularity of Location-based Services (LBS) over the past decade, selling the geolocation information of…
Regularly, hackers steal data sets containing user identifiers and passwords. Often these data sets become publicly available. The most prominent and important leaks use bad password protection mechanisms, e.g. rely on unsalted password hashes, despite longtime known recommendations. The accumulation of leaked password data sets allows the research community to …
The future of manufacturing industry highly depends on digital systems that convert existing production and monitoring systems to autonomous systems with stringent requirements in terms of availability, reliability, security, low latency, positioning with high-accuracy and so on. In order to provide such requirements, a private 5G network deployment is considere…
research Paper / May 2024 / Machine learning/ Deep learning /Artificial Intelligence, Security, Wireless communication
Deep learning based automatic modulation classification (AMC) has received significant attention owing to its potential applications in both military and civilian use cases. Recently, data-driven subsampling techniques have been utilized to overcome the challenges associated with computational complexity and training time for AMC. Beyond these direct advantages …
Spatio-temporal desynchronization remains a major challenge for watermarking system as it could impair the detection of the hidden payload. Over the years, several (non-blind) registration techniques have been proposed to realign the analyzed content prior to watermark detection and thereby achieve robustness against severe attacks such as display-and-camcord. S…
Traditional authentication mechanisms use passwords, PINs and biometrics, but these only authenticate at the point of entry. Continuous authentication schemes instead allow systems to verify identity and mitigate unauthorised access continuously. However, recent developments in generative modelling can significantly threaten continuous authentication systems, al…