Alert button
Picture for Gaurav Kumar Nayak

Gaurav Kumar Nayak

Alert button

GeoCLIP: Clip-Inspired Alignment between Locations and Images for Effective Worldwide Geo-localization

Add code
Bookmark button
Alert button
Sep 27, 2023
Vicente Vivanco Cepeda, Gaurav Kumar Nayak, Mubarak Shah

Figure 1 for GeoCLIP: Clip-Inspired Alignment between Locations and Images for Effective Worldwide Geo-localization
Figure 2 for GeoCLIP: Clip-Inspired Alignment between Locations and Images for Effective Worldwide Geo-localization
Figure 3 for GeoCLIP: Clip-Inspired Alignment between Locations and Images for Effective Worldwide Geo-localization
Figure 4 for GeoCLIP: Clip-Inspired Alignment between Locations and Images for Effective Worldwide Geo-localization
Viaarxiv icon

DAD++: Improved Data-free Test Time Adversarial Defense

Add code
Bookmark button
Alert button
Sep 10, 2023
Gaurav Kumar Nayak, Inder Khatri, Shubham Randive, Ruchit Rawal, Anirban Chakraborty

Figure 1 for DAD++: Improved Data-free Test Time Adversarial Defense
Figure 2 for DAD++: Improved Data-free Test Time Adversarial Defense
Figure 3 for DAD++: Improved Data-free Test Time Adversarial Defense
Figure 4 for DAD++: Improved Data-free Test Time Adversarial Defense
Viaarxiv icon

DISBELIEVE: Distance Between Client Models is Very Essential for Effective Local Model Poisoning Attacks

Add code
Bookmark button
Alert button
Aug 14, 2023
Indu Joshi, Priyank Upadhya, Gaurav Kumar Nayak, Peter Schüffler, Nassir Navab

Figure 1 for DISBELIEVE: Distance Between Client Models is Very Essential for Effective Local Model Poisoning Attacks
Figure 2 for DISBELIEVE: Distance Between Client Models is Very Essential for Effective Local Model Poisoning Attacks
Figure 3 for DISBELIEVE: Distance Between Client Models is Very Essential for Effective Local Model Poisoning Attacks
Figure 4 for DISBELIEVE: Distance Between Client Models is Very Essential for Effective Local Model Poisoning Attacks
Viaarxiv icon

Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition

Add code
Bookmark button
Alert button
Nov 23, 2022
Rohit Gupta, Naveed Akhtar, Gaurav Kumar Nayak, Ajmal Mian, Mubarak Shah

Figure 1 for Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition
Figure 2 for Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition
Figure 3 for Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition
Figure 4 for Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition
Viaarxiv icon

Robust Few-shot Learning Without Using any Adversarial Samples

Add code
Bookmark button
Alert button
Nov 03, 2022
Gaurav Kumar Nayak, Ruchit Rawal, Inder Khatri, Anirban Chakraborty

Figure 1 for Robust Few-shot Learning Without Using any Adversarial Samples
Figure 2 for Robust Few-shot Learning Without Using any Adversarial Samples
Figure 3 for Robust Few-shot Learning Without Using any Adversarial Samples
Figure 4 for Robust Few-shot Learning Without Using any Adversarial Samples
Viaarxiv icon

Data-free Defense of Black Box Models Against Adversarial Attacks

Add code
Bookmark button
Alert button
Nov 03, 2022
Gaurav Kumar Nayak, Inder Khatri, Shubham Randive, Ruchit Rawal, Anirban Chakraborty

Figure 1 for Data-free Defense of Black Box Models Against Adversarial Attacks
Figure 2 for Data-free Defense of Black Box Models Against Adversarial Attacks
Figure 3 for Data-free Defense of Black Box Models Against Adversarial Attacks
Figure 4 for Data-free Defense of Black Box Models Against Adversarial Attacks
Viaarxiv icon

DE-CROP: Data-efficient Certified Robustness for Pretrained Classifiers

Add code
Bookmark button
Alert button
Oct 17, 2022
Gaurav Kumar Nayak, Ruchit Rawal, Anirban Chakraborty

Figure 1 for DE-CROP: Data-efficient Certified Robustness for Pretrained Classifiers
Figure 2 for DE-CROP: Data-efficient Certified Robustness for Pretrained Classifiers
Figure 3 for DE-CROP: Data-efficient Certified Robustness for Pretrained Classifiers
Figure 4 for DE-CROP: Data-efficient Certified Robustness for Pretrained Classifiers
Viaarxiv icon

Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems

Add code
Bookmark button
Alert button
May 05, 2022
Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty

Figure 1 for Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems
Figure 2 for Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems
Figure 3 for Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems
Figure 4 for Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems
Viaarxiv icon

DAD: Data-free Adversarial Defense at Test Time

Add code
Bookmark button
Alert button
Apr 08, 2022
Gaurav Kumar Nayak, Ruchit Rawal, Anirban Chakraborty

Figure 1 for DAD: Data-free Adversarial Defense at Test Time
Figure 2 for DAD: Data-free Adversarial Defense at Test Time
Figure 3 for DAD: Data-free Adversarial Defense at Test Time
Figure 4 for DAD: Data-free Adversarial Defense at Test Time
Viaarxiv icon

Beyond Classification: Knowledge Distillation using Multi-Object Impressions

Add code
Bookmark button
Alert button
Oct 27, 2021
Gaurav Kumar Nayak, Monish Keswani, Sharan Seshadri, Anirban Chakraborty

Figure 1 for Beyond Classification: Knowledge Distillation using Multi-Object Impressions
Figure 2 for Beyond Classification: Knowledge Distillation using Multi-Object Impressions
Figure 3 for Beyond Classification: Knowledge Distillation using Multi-Object Impressions
Figure 4 for Beyond Classification: Knowledge Distillation using Multi-Object Impressions
Viaarxiv icon