no code implementations • 13 Apr 2024 • Furkan Mumcu, Yasin Yilmaz
In addition, we analyze our method's real-time performance with different hardware setups to demonstrate its potential as a practical defense mechanism.
no code implementations • 7 Apr 2022 • Furkan Mumcu, Keval Doshi, Yasin Yilmaz
We demonstrate how Wi-Fi deauthentication attack, a notoriously easy-to-perform and effective denial-of-service (DoS) attack, can be utilized to generate adversarial data for video anomaly detection systems.