Cybersecurity
Evading Deepfake Classifier with Adversarial Attacks
An in-depth analysis of white-box adversarial attacks against deepfake-image detectors, exploring the vulnerability of AI-driven systems.
Vulnerabilities Identification and Exploitation
An extensive report on security testing practices for identifying, assessing, and exploiting vulnerabilities in web applications, detailed with real-world data and code examples.