Skip to main content

Showing 1–5 of 5 results for author: Krombholz, K

Searching in archive cs. Search in all archives.
.
  1. Machine Learning Security in Industry: A Quantitative Survey

    Authors: Kathrin Grosse, Lukas Bieringer, Tarek Richard Besold, Battista Biggio, Katharina Krombholz

    Abstract: Despite the large body of academic work on machine learning security, little is known about the occurrence of attacks on machine learning systems in the wild. In this paper, we report on a quantitative study with 139 industrial practitioners. We analyze attack occurrence and concern and evaluate statistical hypotheses on factors influencing threat perception and exposure. Our results shed light on… ▽ More

    Submitted 10 March, 2023; v1 submitted 11 July, 2022; originally announced July 2022.

    Comments: Accepted at TIFS, version with more detailed appendix containing more detailed statistical results. 17 pages, 6 tables and 4 figures

  2. arXiv:2105.03726  [pdf, other

    cs.CR cs.AI

    Mental Models of Adversarial Machine Learning

    Authors: Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz

    Abstract: Although machine learning is widely used in practice, little is known about practitioners' understanding of potential security challenges. In this work, we close this substantial gap and contribute a qualitative study focusing on developers' mental models of the machine learning pipeline and potentially vulnerable components. Similar studies have helped in other security fields to discover root ca… ▽ More

    Submitted 29 June, 2022; v1 submitted 8 May, 2021; originally announced May 2021.

    Comments: accepted at SOUPS 2022

  3. arXiv:2007.08875  [pdf, other

    cs.HC

    Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators

    Authors: Christian Tiefenau, Maximilian Häring, Katharina Krombholz, Emanuel von Zezschwitz

    Abstract: Experts agree that keeping systems up to date is a powerful security measure. Previous work found that users sometimes explicitly refrain from performing timely updates, e.g., due to bad experiences which has a negative impact on end-user security. Another important user group has been investigated less extensively: system administrators, who are responsible for keeping complex and heterogeneous s… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

  4. arXiv:1909.00300  [pdf, other

    cs.CR cs.CV cs.LG

    VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity

    Authors: Sahar Abdelnabi, Katharina Krombholz, Mario Fritz

    Abstract: Phishing websites are still a major threat in today's Internet ecosystem. Despite numerous previous efforts, similarity-based detection methods do not offer sufficient protection for the trusted websites - in particular against unseen phishing pages. This paper contributes VisualPhishNet, a new similarity-based phishing detection framework, based on a triplet Convolutional Neural Network (CNN). Vi… ▽ More

    Submitted 5 July, 2020; v1 submitted 31 August, 2019; originally announced September 2019.

  5. arXiv:1905.11503  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction

    Authors: Hosnieh Sattar, Katharina Krombholz, Gerard Pons-Moll, Mario Fritz

    Abstract: Modern approaches to pose and body shape estimation have recently achieved strong performance even under challenging real-world conditions. Even from a single image of a clothed person, a realistic looking body shape can be inferred that captures a users' weight group and body shape type well. This opens up a whole spectrum of applications -- in particular in fashion -- where virtual try-on and re… ▽ More

    Submitted 22 October, 2020; v1 submitted 27 May, 2019; originally announced May 2019.

    Journal ref: Proc. of the IEEE European Conference on Computer Vision Workshops (ECCVW), CV-COPS@ECCV2020