关注
Zander Blasingame
Zander Blasingame
Ph.D. Student, Clarkson University
在 clarkson.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Leveraging diffusion for strong and high quality face morphing attacks
Z Blasingame, C Liu
IEEE Transactions on Biometrics, Behavior, and Identity Science, 2024
13*2024
Detecting data exploits using low-level hardware information: A short time series approach
C Liu, Z Yang, Z Blasingame, G Torres, J Bruska
Proceedings of the First Workshop on Radical and Experiential Security, 41-47, 2018
112018
Leveraging adversarial learning for the detection of morphing attacks
Z Blasingame, C Liu
2021 IEEE International Joint Conference on Biometrics (IJCB), 1-8, 2021
92021
Hard-lite: A lightweight hardware anomaly realtime detection framework targeting ransomware
C Woralert, C Liu, Z Blasingame
IEEE Transactions on Circuits and Systems I: Regular Papers, 2023
62023
Verification of OpenSSL version via hardware performance counters
J Bruska, Z Blasingame, C Liu
Disruptive Technologies in Sensors and Sensor Systems 10206, 52-58, 2017
62017
Detecting non-control-flow hijacking attacks using contextual execution information
G Torres, Z Yang, Z Blasingame, J Bruska, C Liu
Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019
52019
Fast-DiM: Towards Fast Diffusion Morphs
ZW Blasingame, C Liu
IEEE Security & Privacy, 2024
2024
AdjointDEIS: Efficient Gradients for Diffusion Models
ZW Blasingame, C Liu
arXiv preprint arXiv:2405.15020, 2024
2024
The Impact of Print-and-Scan in Heterogeneous Morph Evaluation Scenarios
RE Neddo, ZW Blasingame, C Liu
arXiv preprint arXiv:2404.06559, 2024
2024
Greedy-DiM: Greedy Algorithms for Unreasonably Effective Face Morphs
ZW Blasingame, C Liu
arXiv preprint arXiv:2404.06025, 2024
2024
A Comparison of One-class and Two-class Models for Ransomware Detection via Low-level Hardware Information
C Woralert, C Liu, Z Blasingame, Z Yang
2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2023
2023
Feature Creation Towards the Detection of Non-control-Flow Hijacking Attacks
Z Blasingame, C Liu, X Yao
International Conference on Artificial Neural Networks, 153-164, 2021
2021
系统目前无法执行此操作,请稍后再试。
文章 1–12