Completed
Computational Cost
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Recent examples of AI in attacks
- 3 Evolution of evasive malware
- 4 DeepLocker
- 5 Deep Neural Networks
- 6 Target Attributes
- 7 Overview
- 8 Key Generation
- 9 Analysis
- 10 Concealing
- 11 The Wakeup Call
- 12 The Problem
- 13 What is Lockpicking
- 14 Summary
- 15 Questions
- 16 Computational Cost
- 17 Attribute Targeting
- 18 Face Detection