Picture for Ashish Kundu

Ashish Kundu

CISCO Research, USA

NetBurst: Event-Centric Forecasting of Bursty, Intermittent Time Series

Add code
Oct 25, 2025
Viaarxiv icon

SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks

Add code
Jun 12, 2025
Figure 1 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Figure 2 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Figure 3 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Figure 4 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Viaarxiv icon

Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning

Add code
Jun 11, 2025
Figure 1 for Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning
Figure 2 for Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning
Figure 3 for Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning
Figure 4 for Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning
Viaarxiv icon

How Good LLM-Generated Password Policies Are?

Add code
Jun 10, 2025
Figure 1 for How Good LLM-Generated Password Policies Are?
Figure 2 for How Good LLM-Generated Password Policies Are?
Figure 3 for How Good LLM-Generated Password Policies Are?
Figure 4 for How Good LLM-Generated Password Policies Are?
Viaarxiv icon

An Outlook on the Opportunities and Challenges of Multi-Agent AI Systems

Add code
May 23, 2025
Viaarxiv icon

Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation

Add code
Mar 06, 2025
Figure 1 for Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation
Figure 2 for Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation
Figure 3 for Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation
Figure 4 for Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation
Viaarxiv icon

LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs

Add code
Feb 18, 2025
Figure 1 for LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs
Figure 2 for LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs
Figure 3 for LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs
Figure 4 for LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs
Viaarxiv icon

Automated Consistency Analysis of LLMs

Add code
Feb 10, 2025
Figure 1 for Automated Consistency Analysis of LLMs
Figure 2 for Automated Consistency Analysis of LLMs
Figure 3 for Automated Consistency Analysis of LLMs
Figure 4 for Automated Consistency Analysis of LLMs
Viaarxiv icon

Evaluating Synthetic Command Attacks on Smart Voice Assistants

Add code
Nov 13, 2024
Viaarxiv icon

Using Retriever Augmented Large Language Models for Attack Graph Generation

Add code
Aug 11, 2024
Figure 1 for Using Retriever Augmented Large Language Models for Attack Graph Generation
Figure 2 for Using Retriever Augmented Large Language Models for Attack Graph Generation
Figure 3 for Using Retriever Augmented Large Language Models for Attack Graph Generation
Figure 4 for Using Retriever Augmented Large Language Models for Attack Graph Generation
Viaarxiv icon