Picture for Jaydip Sen

Jaydip Sen

A Comparative Study of Hyperparameter Tuning Methods

Add code
Aug 29, 2024
Viaarxiv icon

Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks

Add code
Aug 20, 2024
Viaarxiv icon

Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings: An Indian Perspective

Add code
Aug 08, 2024
Figure 1 for Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings: An Indian Perspective
Figure 2 for Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings: An Indian Perspective
Figure 3 for Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings: An Indian Perspective
Figure 4 for Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings: An Indian Perspective
Viaarxiv icon

Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent

Add code
Jul 29, 2024
Viaarxiv icon

Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation

Add code
Jun 18, 2024
Viaarxiv icon

Boosting Digital Safeguards: Blending Cryptography and Steganography

Add code
Apr 11, 2024
Figure 1 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Figure 2 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Figure 3 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Figure 4 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Viaarxiv icon

Semantic Stealth: Adversarial Text Attacks on NLP Using Several Methods

Add code
Apr 08, 2024
Viaarxiv icon

Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism

Add code
Apr 05, 2024
Viaarxiv icon

Generative AI-Based Text Generation Methods Using Pre-Trained GPT-2 Model

Add code
Apr 02, 2024
Figure 1 for Generative AI-Based Text Generation Methods Using Pre-Trained GPT-2 Model
Figure 2 for Generative AI-Based Text Generation Methods Using Pre-Trained GPT-2 Model
Figure 3 for Generative AI-Based Text Generation Methods Using Pre-Trained GPT-2 Model
Figure 4 for Generative AI-Based Text Generation Methods Using Pre-Trained GPT-2 Model
Viaarxiv icon

Information Security and Privacy in the Digital World: Some Selected Topics

Add code
Mar 30, 2024
Figure 1 for Information Security and Privacy in the Digital World: Some Selected Topics
Figure 2 for Information Security and Privacy in the Digital World: Some Selected Topics
Figure 3 for Information Security and Privacy in the Digital World: Some Selected Topics
Figure 4 for Information Security and Privacy in the Digital World: Some Selected Topics
Viaarxiv icon