Zander Blasingame

Orcid: 0000-0002-9508-8425

According to our database1, Zander Blasingame authored at least 14 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Leveraging Diffusion for Strong and High Quality Face Morphing Attacks.
IEEE Trans. Biom. Behav. Identity Sci., January, 2024

Fast-DiM: Towards Fast Diffusion Morphs.
IEEE Secur. Priv., 2024

AdjointDEIS: Efficient Gradients for Diffusion Models.
CoRR, 2024

The Impact of Print-and-Scan in Heterogeneous Morph Evaluation Scenarios.
CoRR, 2024

The Impact of Print-Scanning in Heterogeneous Morph Evaluation Scenarios.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

Greedy-DiM: Greedy Algorithms for Unreasonably Effective Face Morphs.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

Towards Effective Machine Learning Models for Ransomware Detection via Low-Level Hardware Information.
Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, 2024

2023
HARD-Lite: A Lightweight Hardware Anomaly Realtime Detection Framework Targeting Ransomware.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

Exploring the Design Space of Diffusion Autoencoders for Face Morphing.
CoRR, 2023

Diffusion Models For Stronger Face Morphing Attacks.
CoRR, 2023

A Comparison of One-class and Two-class Models for Ransomware Detection via Low-level Hardware Information.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023

2021
Leveraging Adversarial Learning for the Detection of Morphing Attacks.
Proceedings of the International IEEE Joint Conference on Biometrics, 2021

Feature Creation Towards the Detection of Non-control-Flow Hijacking Attacks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

2019
Detecting Non-Control-Flow Hijacking Attacks Using Contextual Execution Information.
Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, 2019


  Loading...