Alert button
Picture for Shirin Nilizadeh

Shirin Nilizadeh

Alert button

Vulnerabilities Unveiled: Adversarially Attacking a Multimodal Vision Language Model for Pathology Imaging

Add code
Bookmark button
Alert button
Jan 08, 2024
Jai Prakash Veerla, Poojitha Thota, Partha Sai Guttikonda, Shirin Nilizadeh, Jacob M. Luber

Viaarxiv icon

From Chatbots to PhishBots? -- Preventing Phishing scams created using ChatGPT, Google Bard and Claude

Add code
Bookmark button
Alert button
Oct 29, 2023
Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh

Figure 1 for From Chatbots to PhishBots? -- Preventing Phishing scams created using ChatGPT, Google Bard and Claude
Figure 2 for From Chatbots to PhishBots? -- Preventing Phishing scams created using ChatGPT, Google Bard and Claude
Figure 3 for From Chatbots to PhishBots? -- Preventing Phishing scams created using ChatGPT, Google Bard and Claude
Figure 4 for From Chatbots to PhishBots? -- Preventing Phishing scams created using ChatGPT, Google Bard and Claude
Viaarxiv icon

Generating Phishing Attacks using ChatGPT

Add code
Bookmark button
Alert button
May 09, 2023
Sayak Saha Roy, Krishna Vamsi Naragam, Shirin Nilizadeh

Figure 1 for Generating Phishing Attacks using ChatGPT
Figure 2 for Generating Phishing Attacks using ChatGPT
Figure 3 for Generating Phishing Attacks using ChatGPT
Figure 4 for Generating Phishing Attacks using ChatGPT
Viaarxiv icon

StyleGAN as a Utility-Preserving Face De-identification Method

Add code
Bookmark button
Alert button
Dec 05, 2022
Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh

Figure 1 for StyleGAN as a Utility-Preserving Face De-identification Method
Figure 2 for StyleGAN as a Utility-Preserving Face De-identification Method
Figure 3 for StyleGAN as a Utility-Preserving Face De-identification Method
Figure 4 for StyleGAN as a Utility-Preserving Face De-identification Method
Viaarxiv icon

Evaluating the effectiveness of Phishing Reports on Twitter

Add code
Bookmark button
Alert button
Nov 13, 2021
Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh

Figure 1 for Evaluating the effectiveness of Phishing Reports on Twitter
Figure 2 for Evaluating the effectiveness of Phishing Reports on Twitter
Figure 3 for Evaluating the effectiveness of Phishing Reports on Twitter
Figure 4 for Evaluating the effectiveness of Phishing Reports on Twitter
Viaarxiv icon

Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms

Add code
Bookmark button
Alert button
Aug 12, 2021
Anahita Samadi, Debapriya Banerjee, Shirin Nilizadeh

Figure 1 for Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms
Figure 2 for Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms
Figure 3 for Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms
Figure 4 for Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms
Viaarxiv icon

Audio Attacks and Defenses against AED Systems -- A Practical Study

Add code
Bookmark button
Alert button
Jun 25, 2021
Rodrigo dos Santos, Shirin Nilizadeh

Figure 1 for Audio Attacks and Defenses against AED Systems -- A Practical Study
Figure 2 for Audio Attacks and Defenses against AED Systems -- A Practical Study
Figure 3 for Audio Attacks and Defenses against AED Systems -- A Practical Study
Figure 4 for Audio Attacks and Defenses against AED Systems -- A Practical Study
Viaarxiv icon

Detecting Deceptive Reviews using Generative Adversarial Networks

Add code
Bookmark button
Alert button
May 25, 2018
Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna

Figure 1 for Detecting Deceptive Reviews using Generative Adversarial Networks
Figure 2 for Detecting Deceptive Reviews using Generative Adversarial Networks
Figure 3 for Detecting Deceptive Reviews using Generative Adversarial Networks
Viaarxiv icon