Search Results for author: Steve Schneider

Found 2 papers, 0 papers with code

Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior

no code implementations3 Jul 2019 Thomas Gittings, Steve Schneider, John Collomosse

We present a novel method for generating robust adversarial image examples building upon the recent `deep image prior' (DIP) that exploits convolutional network architectures to enforce plausible texture in image synthesis.

Image Generation

Formal Analysis of V2X Revocation Protocols

no code implementations24 Apr 2017 Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne, Stephan Wesemeyer

This paper focusses on the formal analysis of a particular element of security mechanisms for V2X found in many proposals: the revocation of malicious or misbehaving vehicles from the V2X system by invalidating their credentials.

Cryptography and Security D.2.4; D.4.6

Cannot find the paper you are looking for? You can Submit a new open access paper.