Picture for Ashish Kundu

Ashish Kundu

CISCO Research, USA

Can Agentic AI Match the Performance of Human Data Scientists?

Add code
Dec 24, 2025
Viaarxiv icon

NetBurst: Event-Centric Forecasting of Bursty, Intermittent Time Series

Add code
Oct 25, 2025
Viaarxiv icon

SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks

Add code
Jun 12, 2025
Figure 1 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Figure 2 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Figure 3 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Figure 4 for SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Viaarxiv icon

Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning

Add code
Jun 11, 2025
Figure 1 for Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning
Figure 2 for Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning
Figure 3 for Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning
Figure 4 for Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning
Viaarxiv icon

How Good LLM-Generated Password Policies Are?

Add code
Jun 10, 2025
Figure 1 for How Good LLM-Generated Password Policies Are?
Figure 2 for How Good LLM-Generated Password Policies Are?
Figure 3 for How Good LLM-Generated Password Policies Are?
Figure 4 for How Good LLM-Generated Password Policies Are?
Viaarxiv icon

An Outlook on the Opportunities and Challenges of Multi-Agent AI Systems

Add code
May 23, 2025
Viaarxiv icon

Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation

Add code
Mar 06, 2025
Figure 1 for Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation
Figure 2 for Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation
Figure 3 for Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation
Figure 4 for Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation
Viaarxiv icon

LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs

Add code
Feb 18, 2025
Figure 1 for LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs
Figure 2 for LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs
Figure 3 for LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs
Figure 4 for LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs
Viaarxiv icon

Automated Consistency Analysis of LLMs

Add code
Feb 10, 2025
Figure 1 for Automated Consistency Analysis of LLMs
Figure 2 for Automated Consistency Analysis of LLMs
Figure 3 for Automated Consistency Analysis of LLMs
Figure 4 for Automated Consistency Analysis of LLMs
Viaarxiv icon

Evaluating Synthetic Command Attacks on Smart Voice Assistants

Add code
Nov 13, 2024
Viaarxiv icon