Alert button
Picture for Malhar Jere

Malhar Jere

Alert button

ReFace: Real-time Adversarial Attacks on Face Recognition Systems

Jun 09, 2022
Shehzeen Hussain, Todd Huster, Chris Mesterharm, Paarth Neekhara, Kevin An, Malhar Jere, Harshvardhan Sikka, Farinaz Koushanfar

Figure 1 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 2 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 3 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 4 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Viaarxiv icon

Adversarial Scratches: Deployable Attacks to CNN Classifiers

Apr 20, 2022
Loris Giulivi, Malhar Jere, Loris Rossi, Farinaz Koushanfar, Gabriela Ciocarlie, Briland Hitaj, Giacomo Boracchi

Figure 1 for Adversarial Scratches: Deployable Attacks to CNN Classifiers
Figure 2 for Adversarial Scratches: Deployable Attacks to CNN Classifiers
Figure 3 for Adversarial Scratches: Deployable Attacks to CNN Classifiers
Figure 4 for Adversarial Scratches: Deployable Attacks to CNN Classifiers
Viaarxiv icon

A Singular Value Perspective on Model Robustness

Dec 07, 2020
Malhar Jere, Maghav Kumar, Farinaz Koushanfar

Figure 1 for A Singular Value Perspective on Model Robustness
Figure 2 for A Singular Value Perspective on Model Robustness
Figure 3 for A Singular Value Perspective on Model Robustness
Figure 4 for A Singular Value Perspective on Model Robustness
Viaarxiv icon

Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples

Mar 14, 2020
Paarth Neekhara, Shehzeen Hussain, Malhar Jere, Farinaz Koushanfar, Julian McAuley

Figure 1 for Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
Figure 2 for Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
Figure 3 for Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
Figure 4 for Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
Viaarxiv icon

Principal Component Properties of Adversarial Samples

Dec 07, 2019
Malhar Jere, Sandro Herbig, Christine Lind, Farinaz Koushanfar

Figure 1 for Principal Component Properties of Adversarial Samples
Figure 2 for Principal Component Properties of Adversarial Samples
Figure 3 for Principal Component Properties of Adversarial Samples
Figure 4 for Principal Component Properties of Adversarial Samples
Viaarxiv icon

Scratch that! An Evolution-based Adversarial Attack against Neural Networks

Dec 05, 2019
Malhar Jere, Briland Hitaj, Gabriela Ciocarlie, Farinaz Koushanfar

Figure 1 for Scratch that! An Evolution-based Adversarial Attack against Neural Networks
Figure 2 for Scratch that! An Evolution-based Adversarial Attack against Neural Networks
Figure 3 for Scratch that! An Evolution-based Adversarial Attack against Neural Networks
Figure 4 for Scratch that! An Evolution-based Adversarial Attack against Neural Networks
Viaarxiv icon