Picture for Surya Nepal

Surya Nepal

Honeyfile Camouflage: Hiding Fake Files in Plain Sight

Add code
May 08, 2024
Viaarxiv icon

Contextual Chart Generation for Cyber Deception

Add code
Apr 07, 2024
Viaarxiv icon

SoK: Can Trajectory Generation Combine Privacy and Utility?

Add code
Mar 12, 2024
Figure 1 for SoK: Can Trajectory Generation Combine Privacy and Utility?
Figure 2 for SoK: Can Trajectory Generation Combine Privacy and Utility?
Figure 3 for SoK: Can Trajectory Generation Combine Privacy and Utility?
Figure 4 for SoK: Can Trajectory Generation Combine Privacy and Utility?
Viaarxiv icon

A2C: A Modular Multi-stage Collaborative Decision Framework for Human-AI Teams

Add code
Jan 25, 2024
Viaarxiv icon

Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions

Add code
Dec 18, 2023
Viaarxiv icon

Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks

Add code
Sep 28, 2023
Figure 1 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Figure 2 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Figure 3 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Figure 4 for Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks
Viaarxiv icon

RAI4IoE: Responsible AI for Enabling the Internet of Energy

Add code
Sep 20, 2023
Figure 1 for RAI4IoE: Responsible AI for Enabling the Internet of Energy
Figure 2 for RAI4IoE: Responsible AI for Enabling the Internet of Energy
Figure 3 for RAI4IoE: Responsible AI for Enabling the Internet of Energy
Figure 4 for RAI4IoE: Responsible AI for Enabling the Internet of Energy
Viaarxiv icon

Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization

Add code
Sep 18, 2023
Figure 1 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Figure 2 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Figure 3 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Figure 4 for Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization
Viaarxiv icon

Reducing Adversarial Training Cost with Gradient Approximation

Add code
Sep 18, 2023
Figure 1 for Reducing Adversarial Training Cost with Gradient Approximation
Figure 2 for Reducing Adversarial Training Cost with Gradient Approximation
Figure 3 for Reducing Adversarial Training Cost with Gradient Approximation
Figure 4 for Reducing Adversarial Training Cost with Gradient Approximation
Viaarxiv icon

Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection

Add code
Feb 21, 2023
Figure 1 for Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection
Figure 2 for Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection
Figure 3 for Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection
Figure 4 for Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection
Viaarxiv icon