Machine learning (ML) models are known to be vulnerable to a number of
a...
We demonstrate how images and sounds can be used for indirect prompt and...
In recent years, various watermarking methods were suggested to detect
c...
The ability to detect whether an object is a 2D or 3D object is extremel...
In this paper, we present bAdvertisement, a novel attack method against
...
In this study, we propose an innovative method for the real-time detecti...
Advanced driver assistance systems (ADASs) were developed to reduce the
...
The evolution of drone technology in the past nine years since the first...
The current generation of IoT devices is being used by clients and consu...
Drones have created a new threat to people's privacy. We are now in an e...
Online signature verification technologies, such as those available in b...