Alert button
Picture for Inderjeet Singh

Inderjeet Singh

Alert button

Knowledge Distillation-Empowered Digital Twin for Anomaly Detection

Add code
Bookmark button
Alert button
Sep 12, 2023
Qinghua Xu, Shaukat Ali, Tao Yue, Zaimovic Nedim, Inderjeet Singh

Figure 1 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Figure 2 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Figure 3 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Figure 4 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Viaarxiv icon

Simultaneous Adversarial Attacks On Multiple Face Recognition System Components

Add code
Bookmark button
Alert button
Apr 11, 2023
Inderjeet Singh, Kazuya Kakizaki, Toshinori Araki

Figure 1 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 2 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 3 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 4 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Viaarxiv icon

Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples

Add code
Bookmark button
Alert button
Dec 06, 2022
Inderjeet Singh, Kazuya Kakizaki, Toshinori Araki

Figure 1 for Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples
Figure 2 for Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples
Figure 3 for Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples
Figure 4 for Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples
Viaarxiv icon

Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

Add code
Bookmark button
Alert button
Mar 23, 2022
Inderjeet Singh, Toshinori Araki, Kazuya Kakizaki

Figure 1 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 2 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 3 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 4 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Viaarxiv icon

Anomaly Detection using Capsule Networks for High-dimensional Datasets

Add code
Bookmark button
Alert button
Dec 28, 2021
Inderjeet Singh, Nandyala Hemachandra

Figure 1 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Figure 2 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Figure 3 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Figure 4 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Viaarxiv icon

On Brightness Agnostic Adversarial Examples Against Face Recognition Systems

Add code
Bookmark button
Alert button
Sep 29, 2021
Inderjeet Singh, Satoru Momiyama, Kazuya Kakizaki, Toshinori Araki

Figure 1 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 2 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 3 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 4 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Viaarxiv icon

Dodging Attack Using Carefully Crafted Natural Makeup

Add code
Bookmark button
Alert button
Sep 14, 2021
Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici

Figure 1 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 2 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 3 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 4 for Dodging Attack Using Carefully Crafted Natural Makeup
Viaarxiv icon

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

Add code
Bookmark button
Alert button
Jul 05, 2021
Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai

Figure 1 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 2 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 3 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 4 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Viaarxiv icon