Παρακολούθηση
Ashish Hooda
Ashish Hooda
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα wisc.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Invisible perturbations: Physical adversarial examples exploiting the rolling shutter effect
A Sayles (co-lead), A Hooda (co-lead), M Gupta, R Chatterjee, ...
CVPR 2021 (IEEE / CVF Computer Vision and Pattern Recognition Conference), 2021
85*2021
Prp: Propagating universal perturbations to attack large language model guard-rails
N Mangaokar (co-lead), A Hooda (co-lead), J Choi, S Chandrashekaran, ...
ACL Main 2024 (Association for Computational Linguistics), 2024
32*2024
Stateful defenses for machine learning models are not yet secure against black-box attacks
R Feng (co-lead), A Hooda (co-lead), N Mangaokar (co-lead), K Fawaz, ...
CCS 2023 (ACM Conference on Computer and Communications Security), 786-800, 2023
12*2023
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
A Hooda, M Wallace, K Jhunjhunwalla, E Fernandes, K Fawaz
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
102022
Towards adversarially robust deepfake detection: an ensemble approach
A Hooda, N Mangaokar, R Feng, K Fawaz, S Jha, A Prakash
arXiv preprint arXiv:2202.05687, 2022
92022
Do Large Code Models Understand Programming Concepts? Counterfactual Analysis for Code Predicates
A Hooda, M Christodorescu, M Allamanis, A Wilson, K Fawaz, S Jha
ICML 2024 (International conference on machine learning), 2024
8*2024
D4: Detection of adversarial diffusion deepfakes using disjoint ensembles
A Hooda (co-lead), N Mangaokar (co-lead), R Feng, K Fawaz, S Jha, ...
WACV 2024 (IEEE/CVF Winter Conference on Applications of Computer Vision …, 2024
7*2024
Investigating Stateful Defenses Against Black-Box Adversarial Examples
R Feng, A Hooda, N Mangaokar, K Fawaz, S Jha, A Prakash
arXiv preprint arXiv:2303.06280, 2023
52023
Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning
A Hooda, A Labunets, T Kohno, E Fernandes
NDSS 2024 (Network and Distributed Systems Security Symposium), 2024
2*2024
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
A Hooda, N Mangaokar, R Feng, K Fawaz, S Jha, A Prakash
2nd AdvML Frontiers Workshop at ICML 2023, 2023
22023
Computing Optimization-Based Prompt Injections Against Closed-Weights Models By Misusing a Fine-Tuning API
A Labunets, NV Pandya, A Hooda, X Fu, E Fernandes
arXiv preprint arXiv:2501.09798, 2025
2025
Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks
Z Wang, D Anshumaan, A Hooda, Y Chen, S Jha
ICLR 2025 (International Conference on Learning Representations), 2024
2024
PolicyLR: A Logic Representation For Privacy Policies
A Hooda, R Khandelwal, P Chalasani, K Fawaz, S Jha
NeurIPS Safe & Trustworthy Agents Workshop (2024), 2024
2024
Synthetic Counterfactual Faces
GV Ramesh, H Rosenberg, A Hooda, SAK Fawaz
arXiv preprint arXiv:2407.13922, 2024
2024
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–14