Cybersecurity

Evading Deepfake Classifier with Adversarial Attacks

An in-depth analysis of white-box adversarial attacks against deepfake-image detectors, exploring the vulnerability of AI-driven systems.

Vulnerabilities Identification and Exploitation

An extensive report on security testing practices for identifying, assessing, and exploiting vulnerabilities in web applications, detailed with real-world data and code examples.