Alert button
Picture for Alsharif Abuadbba

Alsharif Abuadbba

Alert button

An Investigation into Misuse of Java Security APIs by Large Language Models

Add code
Bookmark button
Alert button
Apr 04, 2024
Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar

Viaarxiv icon

SoK: Can Trajectory Generation Combine Privacy and Utility?

Add code
Bookmark button
Alert button
Mar 12, 2024
Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere

Figure 1 for SoK: Can Trajectory Generation Combine Privacy and Utility?
Figure 2 for SoK: Can Trajectory Generation Combine Privacy and Utility?
Figure 3 for SoK: Can Trajectory Generation Combine Privacy and Utility?
Figure 4 for SoK: Can Trajectory Generation Combine Privacy and Utility?
Viaarxiv icon

A Generative Adversarial Attack for Multilingual Text Classifiers

Add code
Bookmark button
Alert button
Jan 16, 2024
Tom Roth, Inigo Jauregi Unanue, Alsharif Abuadbba, Massimo Piccardi

Viaarxiv icon

SoK: Facial Deepfake Detectors

Add code
Bookmark button
Alert button
Jan 09, 2024
Binh M. Le, Jiwon Kim, Shahroz Tariq, Kristen Moore, Alsharif Abuadbba, Simon S. Woo

Viaarxiv icon

Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices

Add code
Bookmark button
Alert button
Mar 26, 2023
Shahroz Tariq, Alsharif Abuadbba, Kristen Moore

Figure 1 for Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices
Viaarxiv icon

Cybersecurity Challenges of Power Transformers

Add code
Bookmark button
Alert button
Feb 25, 2023
Hossein Rahimpour, Joe Tusek, Alsharif Abuadbba, Aruna Seneviratne, Toan Phung, Ahmed Musleh, Boyu Liu

Figure 1 for Cybersecurity Challenges of Power Transformers
Figure 2 for Cybersecurity Challenges of Power Transformers
Figure 3 for Cybersecurity Challenges of Power Transformers
Figure 4 for Cybersecurity Challenges of Power Transformers
Viaarxiv icon

Why Do Deepfake Detectors Fail?

Add code
Bookmark button
Alert button
Feb 25, 2023
Binh Le, Shahroz Tariq, Alsharif Abuadbba, Kristen Moore, Simon Woo

Figure 1 for Why Do Deepfake Detectors Fail?
Figure 2 for Why Do Deepfake Detectors Fail?
Figure 3 for Why Do Deepfake Detectors Fail?
Figure 4 for Why Do Deepfake Detectors Fail?
Viaarxiv icon

Tracking Dataset IP Use in Deep Neural Networks

Add code
Bookmark button
Alert button
Nov 24, 2022
Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal

Figure 1 for Tracking Dataset IP Use in Deep Neural Networks
Figure 2 for Tracking Dataset IP Use in Deep Neural Networks
Figure 3 for Tracking Dataset IP Use in Deep Neural Networks
Figure 4 for Tracking Dataset IP Use in Deep Neural Networks
Viaarxiv icon

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

Add code
Bookmark button
Alert button
Sep 06, 2022
Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

Figure 1 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 2 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 3 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 4 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Viaarxiv icon

PhishClone: Measuring the Efficacy of Cloning Evasion Attacks

Add code
Bookmark button
Alert button
Sep 04, 2022
Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere

Figure 1 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 2 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 3 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Figure 4 for PhishClone: Measuring the Efficacy of Cloning Evasion Attacks
Viaarxiv icon