Konrad Rieck
Technische Universität Braunschweig
H-index: 47
Europe-Germany
Top articles of Konrad Rieck
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Manipulating Feature Visualizations with Gradient Slingshots | arXiv preprint arXiv:2401.06122 | Dilyara Bareeva Marina M-C Höhne Alexander Warnecke Lukas Pirch Klaus-Robert Müller | 2024/1/11 |
On the Role of Pre-trained Embeddings in Binary Code Analysis | Alwin Maier Felix Weißberg Konrad Rieck | 2023 | |
Lessons Learned on Machine Learning for Computer Security | IEEE Security & Privacy | Daniel Arp Erwin Quiring Feargus Pendlebury Alexander Warnecke Fabio Pierazzi | 2023/9/6 |
PAVUDI: Patch-based Vulnerability Discovery using Machine Learning | Tom Ganz Erik Imgrund Martin Härterich Konrad Rieck | 2023/12/4 | |
Improving malware detection with explainable machine learning | Michele Scalas Konrad Rieck Giorgio Giacinto | 2023/1/1 | |
CodeGraphSMOTE-data augmentation for vulnerability discovery | Tom Ganz Erik Imgrund Martin Härterich Konrad Rieck | 2023/7/12 | |
When Papers Choose Their Reviewers: Adversarial Machine Learning in Peer Review | Konrad Rieck VISP Distinguished Lecture | 2023/11/30 | |
Security of Machine Learning (Dagstuhl Seminar 22281) | Battista Biggio Nicholas Carlini Pavel Laskov Konrad Rieck Antonio Emanuele Cinà | 2023 | |
Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery | Tom Ganz Philipp Rall Martin Härterich Konrad Rieck | 2023/7/3 | |
Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery | Erik Imgrund Tom Ganz Martin Härterich Lukas Pirch Niklas Risse | 2023/11/30 | |
Detecting Backdoors in Collaboration Graphs of Software Repositories | Tom Ganz Inaam Ashraf Martin Härterich Konrad Rieck | 2023/4/24 | |
Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the Wild | Stefan Czybik Micha Horlboge Konrad Rieck | 2023/10/24 | |
Evil from Within: Machine Learning Backdoors through Hardware Trojans | arXiv preprint arXiv:2304.08411 | Alexander Warnecke Julian Speith Jan-Niklas Möller Konrad Rieck Christof Paar | 2023/4/17 |
On the detection of image-scaling attacks in machine learning | Erwin Quiring Andreas Müller Konrad Rieck | 2023/12/4 | |
Learning Type Inference for Enhanced Dataflow Analysis | Lukas Seidel Sedick David Baker Effendi Xavier Pinho Konrad Rieck Brink van der Merwe | 2023/9/25 | |
Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing | Stefan Czybik Daniel Arp Konrad Rieck | 2022/4/14 | |
Dos and don'ts of machine learning in computer security | Daniel Arp Erwin Quiring Feargus Pendlebury Alexander Warnecke Fabio Pierazzi | 2022 | |
I still know it's you! On Challenges in Anonymizing Source Code | arXiv preprint arXiv:2208.12553 | Micha Horlboge Erwin Quiring Roland Meyer Konrad Rieck | 2022/8/26 |
Misleading deep-fake detection with GAN fingerprints | Vera Wesselkamp Konrad Rieck Daniel Arp Erwin Quiring | 2022/5/22 | |
Spying through virtual backgrounds of video calls | Jan Malte Hilgefort Daniel Arp Konrad Rieck | 2021/11/15 |