Alert button
Picture for Ashish Hooda

Ashish Hooda

Alert button

PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails

Add code
Bookmark button
Alert button
Feb 24, 2024
Neal Mangaokar, Ashish Hooda, Jihye Choi, Shreyas Chandrashekaran, Kassem Fawaz, Somesh Jha, Atul Prakash

Viaarxiv icon

Do Large Code Models Understand Programming Concepts? A Black-box Approach

Add code
Bookmark button
Alert button
Feb 23, 2024
Ashish Hooda, Mihai Christodorescu, Miltiadis Allamanis, Aaron Wilson, Kassem Fawaz, Somesh Jha

Viaarxiv icon

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Add code
Bookmark button
Alert button
Jul 30, 2023
Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash

Figure 1 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Figure 2 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Figure 3 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Figure 4 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Viaarxiv icon

Investigating Stateful Defenses Against Black-Box Adversarial Examples

Add code
Bookmark button
Alert button
Mar 17, 2023
Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash

Figure 1 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Figure 2 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Figure 3 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Figure 4 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Viaarxiv icon

SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks

Add code
Bookmark button
Alert button
Dec 16, 2022
Ashish Hooda, Matthew Wallace, Kushal Jhunjhunwalla, Earlence Fernandes, Kassem Fawaz

Figure 1 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Figure 2 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Figure 3 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Figure 4 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Viaarxiv icon

Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance

Add code
Bookmark button
Alert button
Dec 08, 2022
Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes

Figure 1 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Figure 2 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Figure 3 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Figure 4 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Viaarxiv icon

Towards Adversarially Robust Deepfake Detection: An Ensemble Approach

Add code
Bookmark button
Alert button
Feb 11, 2022
Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash

Figure 1 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Figure 2 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Figure 3 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Figure 4 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Viaarxiv icon

Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect

Add code
Bookmark button
Alert button
Nov 30, 2020
Athena Sayles, Ashish Hooda, Mohit Gupta, Rahul Chatterjee, Earlence Fernandes

Figure 1 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Figure 2 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Figure 3 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Figure 4 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Viaarxiv icon