Picture for Kassem Fawaz

Kassem Fawaz

Synthetic Counterfactual Faces

Add code
Jul 18, 2024
Viaarxiv icon

A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok

Add code
Mar 27, 2024
Figure 1 for A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok
Figure 2 for A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok
Figure 3 for A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok
Figure 4 for A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok
Viaarxiv icon

PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails

Add code
Feb 24, 2024
Figure 1 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 2 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 3 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 4 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Viaarxiv icon

Do Large Code Models Understand Programming Concepts? A Black-box Approach

Add code
Feb 23, 2024
Figure 1 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Figure 2 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Figure 3 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Figure 4 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Viaarxiv icon

Human-Producible Adversarial Examples

Add code
Sep 30, 2023
Figure 1 for Human-Producible Adversarial Examples
Figure 2 for Human-Producible Adversarial Examples
Figure 3 for Human-Producible Adversarial Examples
Figure 4 for Human-Producible Adversarial Examples
Viaarxiv icon

Unbiased Face Synthesis With Diffusion Models: Are We There Yet?

Add code
Sep 13, 2023
Viaarxiv icon

SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks

Add code
Aug 23, 2023
Figure 1 for SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
Figure 2 for SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
Figure 3 for SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
Figure 4 for SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks
Viaarxiv icon

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Add code
Jul 30, 2023
Figure 1 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Figure 2 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Figure 3 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Figure 4 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Viaarxiv icon

Investigating Stateful Defenses Against Black-Box Adversarial Examples

Add code
Mar 17, 2023
Figure 1 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Figure 2 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Figure 3 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Figure 4 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Viaarxiv icon

SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks

Add code
Dec 16, 2022
Figure 1 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Figure 2 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Figure 3 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Figure 4 for SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Viaarxiv icon