Alert button
Picture for Manaar Alam

Manaar Alam

Alert button

Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

Add code
Bookmark button
Alert button
Feb 19, 2024
Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay

Viaarxiv icon

HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis

Add code
Bookmark button
Alert button
Jun 07, 2023
Christoforos Vasilatos, Manaar Alam, Talal Rahwan, Yasir Zaki, Michail Maniatakos

Figure 1 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 2 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 3 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 4 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Viaarxiv icon

Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning

Add code
Bookmark button
Alert button
Apr 20, 2023
Manaar Alam, Hithem Lamri, Michail Maniatakos

Figure 1 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 2 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 3 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 4 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Viaarxiv icon

Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries

Add code
Bookmark button
Alert button
Aug 18, 2022
Manaar Alam, Shubhajit Datta, Debdeep Mukhopadhyay, Arijit Mondal, Partha Pratim Chakrabarti

Figure 1 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Figure 2 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Figure 3 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Figure 4 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Viaarxiv icon

On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel

Add code
Bookmark button
Alert button
Aug 03, 2022
Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra

Figure 1 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Figure 2 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Figure 3 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Figure 4 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Viaarxiv icon

PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function

Add code
Bookmark button
Alert button
Dec 09, 2021
Manaar Alam, Shubhajit Datta, Debdeep Mukhopadhyay, Arijit Mondal, Partha Pratim Chakrabarti

Figure 1 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Figure 2 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Figure 3 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Figure 4 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Viaarxiv icon

Deep-Lock: Secure Authorization for Deep Neural Networks

Add code
Bookmark button
Alert button
Aug 13, 2020
Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu

Figure 1 for Deep-Lock: Secure Authorization for Deep Neural Networks
Figure 2 for Deep-Lock: Secure Authorization for Deep Neural Networks
Viaarxiv icon

Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications

Add code
Bookmark button
Alert button
Feb 05, 2019
Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay

Figure 1 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 2 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 3 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 4 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Viaarxiv icon

How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?

Add code
Bookmark button
Alert button
Nov 13, 2018
Manaar Alam, Debdeep Mukhopadhyay

Figure 1 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Figure 2 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Figure 3 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Figure 4 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Viaarxiv icon

Adversarial Attacks and Defences: A Survey

Add code
Bookmark button
Alert button
Sep 28, 2018
Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay

Figure 1 for Adversarial Attacks and Defences: A Survey
Figure 2 for Adversarial Attacks and Defences: A Survey
Figure 3 for Adversarial Attacks and Defences: A Survey
Figure 4 for Adversarial Attacks and Defences: A Survey
Viaarxiv icon