Hayes

Results: 2488



#Item
1Fingerprinting algorithms / Identification / Computing / Cryptography / Statistical classification / Biostatistics / Medical statistics / Fingerprint / Human anatomy / Tor / Sensitivity and specificity / FPR

k-fingerprinting: a Robust Scalable Website Fingerprinting Technique Jamie Hayes George Danezis

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2016-08-14 13:58:02
2Cryptography / Steganography / Steganalysis / Bit numbering / Deep learning / Public-key cryptography / RSA / Generative adversarial network / Artificial neural network / Steganographic file system / BPCS-Steganography

Generating steganographic images via adversarial training Jamie Hayes University College London

Add to Reading List

Source URL: papers.nips.cc

Language: English - Date: 2018-02-13 04:01:42
3Computing / Dark web / Internet / Free software / Cryptographic protocols / Internet Standards / Secure communication / Tor / Operation Onymous / Noise pollution / National Security Agency

traffic confirmation attacks despite noise Jamie Hayes University College London

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2016-07-06 11:58:46
4Computing / Digital rights / Secure communication / Cryptography / Internet privacy / Anonymity / Crypto-anarchism / Mix network / Traffic analysis / Tor / Onion routing / Anonymous post

TASP: Towards Anonymity Sets that Persist Jamie Hayes Carmela Troncoso George Danezis

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2016-09-14 17:31:17
5Applied mathematics / Mathematics / Physics / Deep learning / Perturbation theory / Adversary / Inpainting / Denial-of-service attack / ArXiv / Artificial neural network / Adversarial system

On Visible Adversarial Perturbations & Digital Watermarking Jamie Hayes University College London

Add to Reading List

Source URL: openaccess.thecvf.com

Language: English - Date: 2018-06-15 16:19:34
6Fingerprinting algorithms / Computing / Identification / Internet / Secure communication / Internet Protocol / TCP/IP stack fingerprinting / Fingerprint / Transmission Control Protocol / Tor

k-fingerprinting: a Robust Scalable Website Fingerprinting Technique Jamie Hayes University College London George Danezis

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2017-05-23 12:11:25
7Artificial neural network / Computational neuroscience / Market research / Market segmentation / Mathematical psychology / ResNet / Adversarial system / Applied mathematics

Learning Universal Adversarial Perturbations with Generative Models Jamie Hayes & George Danezis UCL

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2018-06-12 12:53:42
8Artificial intelligence / Machine learning / Computational neuroscience / Learning / Applied mathematics / Artificial neural networks / CIFAR-10 / Deep learning / Training /  test /  and validation sets / ImageNet / Support vector machine / Generative model

1 Learning Universal Adversarial Perturbations with Generative Models Jamie Hayes and George Danezis University College London

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2018-06-12 12:53:19
9Computing / Internet / Free software / Dark web / Cryptographic protocols / Tor / Onion routing / Relay

guard sets for onion routing Jamie Hayes - joint work with George Danezis University College London

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2015-05-28 09:34:34
10Cryptography / Steganography / Steganalysis / Bit numbering / Deep learning / Public-key cryptography / RSA / Generative adversarial network / Artificial neural network / Steganographic file system / BPCS-Steganography

Generating steganographic images via adversarial training Jamie Hayes and George Danezis

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2017-05-23 09:55:51
UPDATE