December 2024
·
3 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
December 2024
·
3 Reads
December 2024
·
3 Reads
December 2024
·
6 Reads
November 2024
·
59 Reads
Given a source image of a clothed person (an image subject), AI-based nudification applications can produce nude (undressed) images of that person. Moreover, not only do such applications exist, but there is ample evidence of the use of such applications in the real world and without the consent of an image subject. Still, despite the growing awareness of the existence of such applications and their potential to violate the rights of image subjects and cause downstream harms, there has been no systematic study of the nudification application ecosystem across multiple applications. We conduct such a study here, focusing on 20 popular and easy-to-find nudification websites. We study the positioning of these web applications (e.g., finding that most sites explicitly target the nudification of women, not all people), the features that they advertise (e.g., ranging from undressing-in-place to the rendering of image subjects in sexual positions, as well as differing user-privacy options), and their underlying monetization infrastructure (e.g., credit cards and cryptocurrencies). We believe this work will empower future, data-informed conversations -- within the scientific, technical, and policy communities -- on how to better protect individuals' rights and minimize harm in the face of modern (and future) AI-based nudification applications. Content warning: This paper includes descriptions of web applications that can be used to create synthetic non-consensual explicit AI-created imagery (SNEACI). This paper also includes an artistic rendering of a user interface for such an application.
June 2024
·
7 Reads
November 2023
·
335 Reads
·
13 Citations
June 2023
·
58 Reads
·
1 Citation
May 2023
·
30 Reads
·
3 Citations
January 2023
·
21 Reads
·
5 Citations
October 2022
·
10 Reads
... Only 17 (22%) papers released their source code, and 5 papers (6%) release the exact prompts used to realize the attack. In contrast, 57 papers (72%) do not provide such low-level details (a result which echoes [62,161]). A detailed explanation of this analysis is provided in Appendix A-D (and these results are also shown in Table IV). ...
Reference:
SoK: On the Offensive Potential of AI
November 2023
... Peeters et al. [30] designed an intelligent approach named LeopardSeal to identify the call eavesdropping through Audio Rogue Base Station (ARBS). The developed Leop-ardSeal approach identified the attacks effectively. ...
June 2023
... By adding high frequency components out of the voice band, attackers can launch spectrum addition attacks to generate the audio that can be interpreted by machines but incomprehensible to humans [1]. In contrast, by removing the frequency components of weak strength from the audio spectrum, an attacker can launch spectrum reduction attacks to generate the audio that can be perceived by humans but cannot be correctly interpreted by machines [3], [2]. Moreover, attackers can manipulate the spectrum magnitude with a specific filter to bypass the spectrum-based detection mechanisms [69]. ...
January 2023
... The various attacks that can occur in the context of SMS OTP include replay attacks, brute force attacks, poor OTP creation attacks, man-in-the-middle attacks, phishing attacks, redirection attacks, and malware attacks. Due to the high risk of attack, the National Institute of Standards and Technology (NIST) [2] and the National Cyber Security Center (NCSC) [3] have removed SMS as a recommended OTP delivery channel. NIST states that the use of SMS is vulnerable to social engineering and malware attacks through endpoint compromise [2]. ...
May 2022
... However, it is also constrained by human assumptions, making it unsuitable for complex devices like Ethernet and USB DMA. FirmWire [29] offers human-crafted peripheral models for baseband firmware. ...
January 2022
... Research has shown that DNNs are also vulnerable to adversarial attacks (Abdullah et al., 2021b;Finlayson et al., 2019;Ma et al., 2021;Szegedy, 2013;Wang et al., 2022Wang et al., , 2023. As modern ASR systems increasingly incorporate Semantic Web-driven technologies to better understand speech, the potential for adversarial attacks becomes even more complex. ...
May 2021
... Abdullah et al. [171] contribute to the growing body of work on adversarial attacks by classifying and evaluating the various vulnerabilities of ASR systems, particularly the endto-end architectures that are commonly used. Their research shows that adversarial attacks generally do not transfer well between different ASR models, calling for more adaptive and comprehensive defense strategies that can account for the unique challenges posed by these architectures. ...
May 2021
... According to industry research, merchants are projected to incur losses of USD 130 billion from fraudulent transactions between 2018 and 2023 [1]. Many financial institutions allocate a security budget ranging from 20% to 30%, known as extended detection and response (XDR), considered a top priority in their security investments [2]. ...
March 2021
IEEE Security and Privacy Magazine
... Adversarial attacks [3][4][5][6], for instance, aim to confuse the SV system by introducing well-crafted perturbations into the speech signals. In recent years, many studies [7][8][9][10][11][12] have conducted effective adversarial attacks on SV systems. On the other hand, spoofing attacks [13,14] attempt to mimic the timbre of target speakers through methods commonly including impersonation, replay, voice conversion, and speech synthesis. ...
January 2019
... The consequences become dangerous when these attacks are directed towards vital infrastructure. They can potentially disrupt essential services such as healthcare, transportation, and emergency response systems, as noted in various studies [25,26]. It is worth highlighting that the increasing integration of Internet of Things (IoT) devices into critical infrastructure renders them particularly susceptible to exploitation. ...
January 2019