Alert button
Picture for Malhar Jere

Malhar Jere

Alert button

ReFace: Real-time Adversarial Attacks on Face Recognition Systems

Add code
Bookmark button
Alert button
Jun 09, 2022
Shehzeen Hussain, Todd Huster, Chris Mesterharm, Paarth Neekhara, Kevin An, Malhar Jere, Harshvardhan Sikka, Farinaz Koushanfar

Figure 1 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 2 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 3 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 4 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Viaarxiv icon

Adversarial Scratches: Deployable Attacks to CNN Classifiers

Add code
Bookmark button
Alert button
Apr 20, 2022
Loris Giulivi, Malhar Jere, Loris Rossi, Farinaz Koushanfar, Gabriela Ciocarlie, Briland Hitaj, Giacomo Boracchi

Figure 1 for Adversarial Scratches: Deployable Attacks to CNN Classifiers
Figure 2 for Adversarial Scratches: Deployable Attacks to CNN Classifiers
Figure 3 for Adversarial Scratches: Deployable Attacks to CNN Classifiers
Figure 4 for Adversarial Scratches: Deployable Attacks to CNN Classifiers
Viaarxiv icon

A Singular Value Perspective on Model Robustness

Add code
Bookmark button
Alert button
Dec 07, 2020
Malhar Jere, Maghav Kumar, Farinaz Koushanfar

Figure 1 for A Singular Value Perspective on Model Robustness
Figure 2 for A Singular Value Perspective on Model Robustness
Figure 3 for A Singular Value Perspective on Model Robustness
Figure 4 for A Singular Value Perspective on Model Robustness
Viaarxiv icon

Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples

Add code
Bookmark button
Alert button
Mar 14, 2020
Paarth Neekhara, Shehzeen Hussain, Malhar Jere, Farinaz Koushanfar, Julian McAuley

Figure 1 for Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
Figure 2 for Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
Figure 3 for Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
Figure 4 for Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
Viaarxiv icon

Principal Component Properties of Adversarial Samples

Add code
Bookmark button
Alert button
Dec 07, 2019
Malhar Jere, Sandro Herbig, Christine Lind, Farinaz Koushanfar

Figure 1 for Principal Component Properties of Adversarial Samples
Figure 2 for Principal Component Properties of Adversarial Samples
Figure 3 for Principal Component Properties of Adversarial Samples
Figure 4 for Principal Component Properties of Adversarial Samples
Viaarxiv icon

Scratch that! An Evolution-based Adversarial Attack against Neural Networks

Add code
Bookmark button
Alert button
Dec 05, 2019
Malhar Jere, Briland Hitaj, Gabriela Ciocarlie, Farinaz Koushanfar

Figure 1 for Scratch that! An Evolution-based Adversarial Attack against Neural Networks
Figure 2 for Scratch that! An Evolution-based Adversarial Attack against Neural Networks
Figure 3 for Scratch that! An Evolution-based Adversarial Attack against Neural Networks
Figure 4 for Scratch that! An Evolution-based Adversarial Attack against Neural Networks
Viaarxiv icon