Alert button
Picture for Srikanth V. Krishnamurthy

Srikanth V. Krishnamurthy

Alert button

FLASH: Federated Learning Across Simultaneous Heterogeneities

Add code
Bookmark button
Alert button
Feb 13, 2024
Xiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy-Chowdhury

Viaarxiv icon

Plug-and-Play Transformer Modules for Test-Time Adaptation

Add code
Bookmark button
Alert button
Jan 10, 2024
Xiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy-Chowdhury

Viaarxiv icon

Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks

Add code
Bookmark button
Alert button
Oct 03, 2022
Abhishek Aich, Shasha Li, Chengyu Song, M. Salman Asif, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury

Figure 1 for Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Figure 2 for Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Figure 3 for Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Figure 4 for Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Viaarxiv icon

GAMA: Generative Adversarial Multi-Object Scene Attacks

Add code
Bookmark button
Alert button
Sep 20, 2022
Abhishek Aich, Calvin Khang-Ta, Akash Gupta, Chengyu Song, Srikanth V. Krishnamurthy, M. Salman Asif, Amit K. Roy-Chowdhury

Figure 1 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Figure 2 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Figure 3 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Figure 4 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Viaarxiv icon

Zero-Query Transfer Attacks on Context-Aware Object Detectors

Add code
Bookmark button
Alert button
Mar 29, 2022
Zikui Cai, Shantanu Rane, Alejandro E. Brito, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

Figure 1 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Figure 2 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Figure 3 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Figure 4 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Viaarxiv icon

Context-Aware Transfer Attacks for Object Detection

Add code
Bookmark button
Alert button
Dec 06, 2021
Zikui Cai, Xinxin Xie, Shasha Li, Mingjun Yin, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

Figure 1 for Context-Aware Transfer Attacks for Object Detection
Figure 2 for Context-Aware Transfer Attacks for Object Detection
Figure 3 for Context-Aware Transfer Attacks for Object Detection
Figure 4 for Context-Aware Transfer Attacks for Object Detection
Viaarxiv icon

ADC: Adversarial attacks against object Detection that evade Context consistency checks

Add code
Bookmark button
Alert button
Oct 24, 2021
Mingjun Yin, Shasha Li, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

Figure 1 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Figure 2 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Figure 3 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Figure 4 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Viaarxiv icon

Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes

Add code
Bookmark button
Alert button
Aug 19, 2021
Mingjun Yin, Shasha Li, Zikui Cai, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

Figure 1 for Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
Figure 2 for Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
Figure 3 for Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
Figure 4 for Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
Viaarxiv icon

Measurement-driven Security Analysis of Imperceptible Impersonation Attacks

Add code
Bookmark button
Alert button
Aug 26, 2020
Shasha Li, Karim Khalil, Rameswar Panda, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami

Figure 1 for Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
Figure 2 for Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
Figure 3 for Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
Figure 4 for Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
Viaarxiv icon