Alert button
Picture for Susmit Jha

Susmit Jha

Alert button

Detecting out-of-context objects using contextual cues

Add code
Bookmark button
Alert button
Feb 11, 2022
Manoj Acharya, Anirban Roy, Kaushik Koneripalli, Susmit Jha, Christopher Kanan, Ajay Divakaran

Figure 1 for Detecting out-of-context objects using contextual cues
Figure 2 for Detecting out-of-context objects using contextual cues
Figure 3 for Detecting out-of-context objects using contextual cues
Figure 4 for Detecting out-of-context objects using contextual cues
Viaarxiv icon

iDECODe: In-distribution Equivariance for Conformal Out-of-distribution Detection

Add code
Bookmark button
Alert button
Jan 07, 2022
Ramneet Kaur, Susmit Jha, Anirban Roy, Sangdon Park, Edgar Dobriban, Oleg Sokolsky, Insup Lee

Figure 1 for iDECODe: In-distribution Equivariance for Conformal Out-of-distribution Detection
Figure 2 for iDECODe: In-distribution Equivariance for Conformal Out-of-distribution Detection
Figure 3 for iDECODe: In-distribution Equivariance for Conformal Out-of-distribution Detection
Figure 4 for iDECODe: In-distribution Equivariance for Conformal Out-of-distribution Detection
Viaarxiv icon

Dual-Key Multimodal Backdoors for Visual Question Answering

Add code
Bookmark button
Alert button
Dec 14, 2021
Matthew Walmer, Karan Sikka, Indranil Sur, Abhinav Shrivastava, Susmit Jha

Figure 1 for Dual-Key Multimodal Backdoors for Visual Question Answering
Figure 2 for Dual-Key Multimodal Backdoors for Visual Question Answering
Figure 3 for Dual-Key Multimodal Backdoors for Visual Question Answering
Figure 4 for Dual-Key Multimodal Backdoors for Visual Question Answering
Viaarxiv icon

Trigger Hunting with a Topological Prior for Trojan Detection

Add code
Bookmark button
Alert button
Oct 15, 2021
Xiaoling Hu, Xiao Lin, Michael Cogswell, Yi Yao, Susmit Jha, Chao Chen

Figure 1 for Trigger Hunting with a Topological Prior for Trojan Detection
Figure 2 for Trigger Hunting with a Topological Prior for Trojan Detection
Figure 3 for Trigger Hunting with a Topological Prior for Trojan Detection
Figure 4 for Trigger Hunting with a Topological Prior for Trojan Detection
Viaarxiv icon

Protein Folding Neural Networks Are Not Robust

Add code
Bookmark button
Alert button
Sep 19, 2021
Sumit Kumar Jha, Arvind Ramanathan, Rickard Ewetz, Alvaro Velasquez, Susmit Jha

Figure 1 for Protein Folding Neural Networks Are Not Robust
Figure 2 for Protein Folding Neural Networks Are Not Robust
Figure 3 for Protein Folding Neural Networks Are Not Robust
Figure 4 for Protein Folding Neural Networks Are Not Robust
Viaarxiv icon

Detecting OODs as datapoints with High Uncertainty

Add code
Bookmark button
Alert button
Aug 13, 2021
Ramneet Kaur, Susmit Jha, Anirban Roy, Sangdon Park, Oleg Sokolsky, Insup Lee

Figure 1 for Detecting OODs as datapoints with High Uncertainty
Figure 2 for Detecting OODs as datapoints with High Uncertainty
Figure 3 for Detecting OODs as datapoints with High Uncertainty
Figure 4 for Detecting OODs as datapoints with High Uncertainty
Viaarxiv icon

Online Defense of Trojaned Models using Misattributions

Add code
Bookmark button
Alert button
Mar 29, 2021
Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha

Figure 1 for Online Defense of Trojaned Models using Misattributions
Figure 2 for Online Defense of Trojaned Models using Misattributions
Figure 3 for Online Defense of Trojaned Models using Misattributions
Figure 4 for Online Defense of Trojaned Models using Misattributions
Viaarxiv icon

Are all outliers alike? On Understanding the Diversity of Outliers for Detecting OODs

Add code
Bookmark button
Alert button
Mar 23, 2021
Ramneet Kaur, Susmit Jha, Anirban Roy, Oleg Sokolsky, Insup Lee

Figure 1 for Are all outliers alike? On Understanding the Diversity of Outliers for Detecting OODs
Figure 2 for Are all outliers alike? On Understanding the Diversity of Outliers for Detecting OODs
Figure 3 for Are all outliers alike? On Understanding the Diversity of Outliers for Detecting OODs
Figure 4 for Are all outliers alike? On Understanding the Diversity of Outliers for Detecting OODs
Viaarxiv icon

Detecting Trojaned DNNs Using Counterfactual Attributions

Add code
Bookmark button
Alert button
Dec 03, 2020
Karan Sikka, Indranil Sur, Susmit Jha, Anirban Roy, Ajay Divakaran

Figure 1 for Detecting Trojaned DNNs Using Counterfactual Attributions
Figure 2 for Detecting Trojaned DNNs Using Counterfactual Attributions
Figure 3 for Detecting Trojaned DNNs Using Counterfactual Attributions
Figure 4 for Detecting Trojaned DNNs Using Counterfactual Attributions
Viaarxiv icon