Search

Your search keyword '"Nassi, Ben"' showing total 42 results

Search Constraints

Start Over You searched for: Author "Nassi, Ben" Remove constraint Author: "Nassi, Ben"
42 results on '"Nassi, Ben"'

Search Results

1. Injection Attacks Against End-to-End Encrypted Applications

2. Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking

3. Exploiting Leakage in Password Managers via Injection Attacks

4. A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares

5. Private Hierarchical Governance for Encrypted Messaging

6. Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications

7. The Adversarial Implications of Variable-Time Inference

8. Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs

9. Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models

10. EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome

11. bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements

12. VISAS -- Detecting GPS spoofing attacks against drones by analyzing camera's video stream

13. MobilBye: Attacking ADAS with Camera Spoofing

14. SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps

15. Piping Botnet - Turning Green Technology into a Water Disaster

16. Game of Drones - Detecting Streamed POI from Encrypted FPV Channel

17. Oops!...I think I scanned a malware

18. Game of Drones - Detecting Spying Drones Using Time Domain Analysis

19. Handwritten Signature Verification Using Hand-Worn Devices

20. Virtual Breathalyzer

21. Protecting Autonomous Cars from Phantom Attacks.

Catalog

Books, media, physical & digital resources