Alert button
Picture for Arezoo Rajabi

Arezoo Rajabi

Alert button

Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors

Add code
Bookmark button
Alert button
Feb 12, 2024
Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran

Viaarxiv icon

Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization

Add code
Bookmark button
Alert button
Feb 02, 2024
Arezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj, Bhaskar Ramasubramanian, Radha Poovendran

Viaarxiv icon

MDTD: A Multi Domain Trojan Detector for Deep Neural Networks

Add code
Bookmark button
Alert button
Sep 03, 2023
Arezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, Jim Ritcey, Radha Poovendran

Figure 1 for MDTD: A Multi Domain Trojan Detector for Deep Neural Networks
Figure 2 for MDTD: A Multi Domain Trojan Detector for Deep Neural Networks
Figure 3 for MDTD: A Multi Domain Trojan Detector for Deep Neural Networks
Figure 4 for MDTD: A Multi Domain Trojan Detector for Deep Neural Networks
Viaarxiv icon

LDL: A Defense for Label-Based Membership Inference Attacks

Add code
Bookmark button
Alert button
Dec 16, 2022
Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran

Figure 1 for LDL: A Defense for Label-Based Membership Inference Attacks
Figure 2 for LDL: A Defense for Label-Based Membership Inference Attacks
Figure 3 for LDL: A Defense for Label-Based Membership Inference Attacks
Figure 4 for LDL: A Defense for Label-Based Membership Inference Attacks
Viaarxiv icon

Game of Trojans: A Submodular Byzantine Approach

Add code
Bookmark button
Alert button
Jul 13, 2022
Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran

Figure 1 for Game of Trojans: A Submodular Byzantine Approach
Figure 2 for Game of Trojans: A Submodular Byzantine Approach
Figure 3 for Game of Trojans: A Submodular Byzantine Approach
Figure 4 for Game of Trojans: A Submodular Byzantine Approach
Viaarxiv icon

Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning

Add code
Bookmark button
Alert button
Mar 25, 2022
Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran

Figure 1 for Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Figure 2 for Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Figure 3 for Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Figure 4 for Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning
Viaarxiv icon

Privacy-Preserving Reinforcement Learning Beyond Expectation

Add code
Bookmark button
Alert button
Mar 18, 2022
Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran

Figure 1 for Privacy-Preserving Reinforcement Learning Beyond Expectation
Figure 2 for Privacy-Preserving Reinforcement Learning Beyond Expectation
Figure 3 for Privacy-Preserving Reinforcement Learning Beyond Expectation
Viaarxiv icon

Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs

Add code
Bookmark button
Alert button
Nov 18, 2020
Arezoo Rajabi, Rakesh B. Bobba

Figure 1 for Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs
Figure 2 for Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs
Viaarxiv icon