Alert button
Picture for Surya Nepal

Surya Nepal

Alert button

Diverse Multimedia Layout Generation with Multi Choice Learning

Add code
Bookmark button
Alert button
Jan 16, 2023
David D. Nguyen, Surya Nepal, Salil S. Kanhere

Figure 1 for Diverse Multimedia Layout Generation with Multi Choice Learning
Figure 2 for Diverse Multimedia Layout Generation with Multi Choice Learning
Figure 3 for Diverse Multimedia Layout Generation with Multi Choice Learning
Figure 4 for Diverse Multimedia Layout Generation with Multi Choice Learning
Viaarxiv icon

Masked Vector Quantization

Add code
Bookmark button
Alert button
Jan 16, 2023
David D. Nguyen, David Leibowitz, Surya Nepal, Salil S. Kanhere

Figure 1 for Masked Vector Quantization
Figure 2 for Masked Vector Quantization
Figure 3 for Masked Vector Quantization
Figure 4 for Masked Vector Quantization
Viaarxiv icon

Tracking Dataset IP Use in Deep Neural Networks

Add code
Bookmark button
Alert button
Nov 24, 2022
Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal

Figure 1 for Tracking Dataset IP Use in Deep Neural Networks
Figure 2 for Tracking Dataset IP Use in Deep Neural Networks
Figure 3 for Tracking Dataset IP Use in Deep Neural Networks
Figure 4 for Tracking Dataset IP Use in Deep Neural Networks
Viaarxiv icon

Profiler: Profile-Based Model to Detect Phishing Emails

Add code
Bookmark button
Alert button
Aug 18, 2022
Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal

Figure 1 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 2 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 3 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 4 for Profiler: Profile-Based Model to Detect Phishing Emails
Viaarxiv icon

Deception for Cyber Defence: Challenges and Opportunities

Add code
Bookmark button
Alert button
Aug 15, 2022
David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar

Figure 1 for Deception for Cyber Defence: Challenges and Opportunities
Figure 2 for Deception for Cyber Defence: Challenges and Opportunities
Figure 3 for Deception for Cyber Defence: Challenges and Opportunities
Figure 4 for Deception for Cyber Defence: Challenges and Opportunities
Viaarxiv icon

Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms

Add code
Bookmark button
Alert button
Apr 07, 2022
Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal

Figure 1 for Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms
Figure 2 for Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms
Figure 3 for Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms
Figure 4 for Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms
Viaarxiv icon

Towards Web Phishing Detection Limitations and Mitigation

Add code
Bookmark button
Alert button
Apr 03, 2022
Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

Figure 1 for Towards Web Phishing Detection Limitations and Mitigation
Figure 2 for Towards Web Phishing Detection Limitations and Mitigation
Figure 3 for Towards Web Phishing Detection Limitations and Mitigation
Figure 4 for Towards Web Phishing Detection Limitations and Mitigation
Viaarxiv icon

Integrity Fingerprinting of DNN with Double Black-box Design and Verification

Add code
Bookmark button
Alert button
Mar 23, 2022
Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Surya Nepal, Salil Kanhere

Figure 1 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 2 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 3 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Figure 4 for Integrity Fingerprinting of DNN with Double Black-box Design and Verification
Viaarxiv icon

TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

Add code
Bookmark button
Alert button
Mar 15, 2022
Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere

Figure 1 for TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing
Figure 2 for TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing
Figure 3 for TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing
Figure 4 for TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing
Viaarxiv icon

Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study

Add code
Bookmark button
Alert button
Mar 14, 2022
Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

Figure 1 for Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study
Figure 2 for Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study
Figure 3 for Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study
Figure 4 for Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study
Viaarxiv icon