GeekPwn

@GeekPwn

First Worldwide Security Geek Contest for Smart Devices and AI.

Vrijeme pridruživanja: lipanj 2014.
Rođen/a 24. listopada

Tweetovi

Blokirali ste korisnika/cu @GeekPwn

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @GeekPwn

  1. 2. srp 2019.

    Can you fool AI with special voice? Can you fool image recognition with creative method? It's time to register for CAAD Voice Recognition Challenge & CAAD CTF on Image Recognition:

    Poništi
  2. 11. stu 2018.

    Thanks to all of the researchers submitting to the and vendors patching bugs.

    Poništi
  3. 7. stu 2018.

    They demonstrated to exploit a series of smart devices to mining cryptocurrency, by means of zero-day vulnerabilities, cross-platform mining tools, automated attacks such as worms.

    Poništi
  4. 7. stu 2018.
    Poništi
  5. 6. stu 2018.
    Poništi
  6. 6. stu 2018.

    CAAD CTF was held on Shanghai. 6 teams are invited. Finally team IYSWIM(Yuxin Wu, Cihang Xie) won 1st place prize RMB 30K. They successfully attacked online celebrity recognition service of Amazon . Make it think the presenter is Arnold .

    Poništi
  7. 6. stu 2018.

    The Competition on Adversarial Attacks and Defenses (CAAD 2018) ended. 5 top teams of 3 sub-competiitons shared total prize USD $100K. Congratulate team ysharma1126 won 1st places of attacks and team FAIR & JHU won 1st place of Defense. More at:

    Poništi
  8. 27. ruj 2018.

    A highlighted talk at the Defcon 2018 CAAD Village, "Magic Tricks for Self-driving Cars", by Weilin Xu & Zhenyu Zhong & Yunhan Jia from Baidu X-Lab. Check it out here:

    Poništi
  9. 27. ruj 2018.
    Poništi
  10. proslijedio/la je Tweet
    11. ruj 2018.

    Welcome to Tencent Security Conference (TenSec). Check the link below for more details. Registration is available at the bottom of blog.

    Poništi
  11. 10. ruj 2018.

    on Oct. 24-25 is coming! We welcome talented security researchers and geeks around the world to come to GeekPwn, and present your research results. Register here Tickets:

    Poništi
  12. proslijedio/la je Tweet

    Weak encryption in the keyless entry system for Tesla’s Model S allowed security researchers to clone a key fob in seconds, open the car’s doors and drive it away.

    Poništi
  13. proslijedio/la je Tweet
    6. ruj 2018.

    If you are working on adversarial ML and looking to contribute to open-source, the CleverHans library issue tracker is a great place to start. Look for issues that have the label "help wanted" or "new feature":

    Poništi
  14. 2. ruj 2018.

    What Happens n Vegas stays on Youtube...GeekPwn 2018 in Las Vegas 来自

    Poništi
  15. 31. kol 2018.

    Did you miss the at ? A friendly reminder - a couple of important deadlines are approaching! Check out for more:

    Poništi
  16. proslijedio/la je Tweet
    27. kol 2018.

    The healthcare industry is in a world of cybersecurity hurt via

    Poništi
  17. 21. kol 2018.

    🥳Just a reminder, follow the link and get involved in , Competition on Adversarial Attacks & Defenses.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    19. kol 2018.
    Poništi
  19. proslijedio/la je Tweet
    12. kol 2018.
    Poništi
  20. 12. kol 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·