Alert button
Picture for Srikanth V. Krishnamurthy

Srikanth V. Krishnamurthy

Alert button

FLASH: Federated Learning Across Simultaneous Heterogeneities

Feb 13, 2024
Xiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy-Chowdhury

Viaarxiv icon

Plug-and-Play Transformer Modules for Test-Time Adaptation

Jan 10, 2024
Xiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy-Chowdhury

Viaarxiv icon

Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks

Oct 03, 2022
Abhishek Aich, Shasha Li, Chengyu Song, M. Salman Asif, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury

Figure 1 for Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Figure 2 for Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Figure 3 for Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Figure 4 for Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks
Viaarxiv icon

GAMA: Generative Adversarial Multi-Object Scene Attacks

Sep 20, 2022
Abhishek Aich, Calvin Khang-Ta, Akash Gupta, Chengyu Song, Srikanth V. Krishnamurthy, M. Salman Asif, Amit K. Roy-Chowdhury

Figure 1 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Figure 2 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Figure 3 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Figure 4 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Viaarxiv icon

Zero-Query Transfer Attacks on Context-Aware Object Detectors

Mar 29, 2022
Zikui Cai, Shantanu Rane, Alejandro E. Brito, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

Figure 1 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Figure 2 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Figure 3 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Figure 4 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Viaarxiv icon

Context-Aware Transfer Attacks for Object Detection

Dec 06, 2021
Zikui Cai, Xinxin Xie, Shasha Li, Mingjun Yin, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

Figure 1 for Context-Aware Transfer Attacks for Object Detection
Figure 2 for Context-Aware Transfer Attacks for Object Detection
Figure 3 for Context-Aware Transfer Attacks for Object Detection
Figure 4 for Context-Aware Transfer Attacks for Object Detection
Viaarxiv icon

ADC: Adversarial attacks against object Detection that evade Context consistency checks

Oct 24, 2021
Mingjun Yin, Shasha Li, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

Figure 1 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Figure 2 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Figure 3 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Figure 4 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Viaarxiv icon

Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes

Aug 19, 2021
Mingjun Yin, Shasha Li, Zikui Cai, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

Figure 1 for Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
Figure 2 for Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
Figure 3 for Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
Figure 4 for Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
Viaarxiv icon

Measurement-driven Security Analysis of Imperceptible Impersonation Attacks

Aug 26, 2020
Shasha Li, Karim Khalil, Rameswar Panda, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami

Figure 1 for Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
Figure 2 for Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
Figure 3 for Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
Figure 4 for Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
Viaarxiv icon