Alert button
Picture for Bimal Viswanath

Bimal Viswanath

Alert button

Deepfake Text Detection: Limitations and Opportunities

Add code
Bookmark button
Alert button
Oct 17, 2022
Jiameng Pu, Zain Sarwar, Sifat Muhammad Abdullah, Abdullah Rehman, Yoonjin Kim, Parantapa Bhattacharya, Mobin Javed, Bimal Viswanath

Figure 1 for Deepfake Text Detection: Limitations and Opportunities
Figure 2 for Deepfake Text Detection: Limitations and Opportunities
Figure 3 for Deepfake Text Detection: Limitations and Opportunities
Figure 4 for Deepfake Text Detection: Limitations and Opportunities
Viaarxiv icon

Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models

Add code
Bookmark button
Alert button
Apr 05, 2021
Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath

Figure 1 for Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Figure 2 for Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Figure 3 for Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Figure 4 for Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Viaarxiv icon

Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons

Add code
Bookmark button
Alert button
Mar 18, 2021
Ya Xiao, Salman Ahmed, Wenjia Song, Xinyang Ge, Bimal Viswanath, Danfeng Yao

Figure 1 for Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons
Figure 2 for Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons
Figure 3 for Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons
Figure 4 for Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons
Viaarxiv icon

Deepfake Videos in the Wild: Analysis and Detection

Add code
Bookmark button
Alert button
Mar 11, 2021
Jiameng Pu, Neal Mangaokar, Lauren Kelly, Parantapa Bhattacharya, Kavya Sundaram, Mobin Javed, Bolun Wang, Bimal Viswanath

Figure 1 for Deepfake Videos in the Wild: Analysis and Detection
Figure 2 for Deepfake Videos in the Wild: Analysis and Detection
Figure 3 for Deepfake Videos in the Wild: Analysis and Detection
Figure 4 for Deepfake Videos in the Wild: Analysis and Detection
Viaarxiv icon

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification

Add code
Bookmark button
Alert button
Mar 11, 2021
Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath

Figure 1 for T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
Figure 2 for T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
Figure 3 for T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
Figure 4 for T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
Viaarxiv icon