Picture for Earlence Fernandes

Earlence Fernandes

ceLLMate: Sandboxing Browser AI Agents

Add code
Dec 14, 2025
Viaarxiv icon

May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks

Add code
Jul 10, 2025
Figure 1 for May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks
Figure 2 for May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks
Figure 3 for May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks
Figure 4 for May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks
Viaarxiv icon

Words as Geometric Features: Estimating Homography using Optical Character Recognition as Compressed Image Representation

Add code
May 25, 2025
Figure 1 for Words as Geometric Features: Estimating Homography using Optical Character Recognition as Compressed Image Representation
Figure 2 for Words as Geometric Features: Estimating Homography using Optical Character Recognition as Compressed Image Representation
Figure 3 for Words as Geometric Features: Estimating Homography using Optical Character Recognition as Compressed Image Representation
Figure 4 for Words as Geometric Features: Estimating Homography using Optical Character Recognition as Compressed Image Representation
Viaarxiv icon

Misusing Tools in Large Language Models With Visual Adversarial Examples

Add code
Oct 04, 2023
Figure 1 for Misusing Tools in Large Language Models With Visual Adversarial Examples
Figure 2 for Misusing Tools in Large Language Models With Visual Adversarial Examples
Figure 3 for Misusing Tools in Large Language Models With Visual Adversarial Examples
Figure 4 for Misusing Tools in Large Language Models With Visual Adversarial Examples
Viaarxiv icon

SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks

Add code
Dec 16, 2022
Figure 1 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Figure 2 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Figure 3 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Figure 4 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Viaarxiv icon

Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance

Add code
Dec 08, 2022
Figure 1 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Figure 2 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Figure 3 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Figure 4 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Viaarxiv icon

Exploring Adversarial Robustness of Deep Metric Learning

Add code
Feb 14, 2021
Figure 1 for Exploring Adversarial Robustness of Deep Metric Learning
Figure 2 for Exploring Adversarial Robustness of Deep Metric Learning
Figure 3 for Exploring Adversarial Robustness of Deep Metric Learning
Figure 4 for Exploring Adversarial Robustness of Deep Metric Learning
Viaarxiv icon

Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems

Add code
Dec 16, 2020
Figure 1 for Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems
Figure 2 for Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems
Figure 3 for Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems
Figure 4 for Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems
Viaarxiv icon

Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect

Add code
Nov 30, 2020
Figure 1 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Figure 2 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Figure 3 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Figure 4 for Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Viaarxiv icon

Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification

Add code
Feb 17, 2020
Figure 1 for Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification
Figure 2 for Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification
Figure 3 for Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification
Figure 4 for Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification
Viaarxiv icon