Picture for Ashish Hooda

Ashish Hooda

PolicyLR: A Logic Representation For Privacy Policies

Add code
Aug 27, 2024
Viaarxiv icon

Synthetic Counterfactual Faces

Add code
Jul 18, 2024
Viaarxiv icon

PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails

Add code
Feb 24, 2024
Viaarxiv icon

Do Large Code Models Understand Programming Concepts? A Black-box Approach

Add code
Feb 23, 2024
Viaarxiv icon

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Add code
Jul 30, 2023
Viaarxiv icon

Investigating Stateful Defenses Against Black-Box Adversarial Examples

Add code
Mar 17, 2023
Viaarxiv icon

SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks

Add code
Dec 16, 2022
Viaarxiv icon

Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance

Add code
Dec 08, 2022
Viaarxiv icon

Towards Adversarially Robust Deepfake Detection: An Ensemble Approach

Add code
Feb 11, 2022
Figure 1 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Figure 2 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Figure 3 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Figure 4 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Viaarxiv icon

Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect

Add code
Nov 30, 2020
Figure 1 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Figure 2 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Figure 3 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Figure 4 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Viaarxiv icon