Picture for Tadayoshi Kohno

Tadayoshi Kohno

Analyzing the AI Nudification Application Ecosystem

Add code
Nov 14, 2024
Figure 1 for Analyzing the AI Nudification Application Ecosystem
Figure 2 for Analyzing the AI Nudification Application Ecosystem
Figure 3 for Analyzing the AI Nudification Application Ecosystem
Figure 4 for Analyzing the AI Nudification Application Ecosystem
Viaarxiv icon

Breaking News: Case Studies of Generative AI's Use in Journalism

Add code
Jun 19, 2024
Figure 1 for Breaking News: Case Studies of Generative AI's Use in Journalism
Figure 2 for Breaking News: Case Studies of Generative AI's Use in Journalism
Figure 3 for Breaking News: Case Studies of Generative AI's Use in Journalism
Figure 4 for Breaking News: Case Studies of Generative AI's Use in Journalism
Viaarxiv icon

Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp

Add code
May 13, 2024
Figure 1 for Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp
Figure 2 for Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp
Figure 3 for Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp
Figure 4 for Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp
Viaarxiv icon

Particip-AI: A Democratic Surveying Framework for Anticipating Future AI Use Cases, Harms and Benefits

Add code
Mar 21, 2024
Figure 1 for Particip-AI: A Democratic Surveying Framework for Anticipating Future AI Use Cases, Harms and Benefits
Figure 2 for Particip-AI: A Democratic Surveying Framework for Anticipating Future AI Use Cases, Harms and Benefits
Figure 3 for Particip-AI: A Democratic Surveying Framework for Anticipating Future AI Use Cases, Harms and Benefits
Figure 4 for Particip-AI: A Democratic Surveying Framework for Anticipating Future AI Use Cases, Harms and Benefits
Viaarxiv icon

SecGPT: An Execution Isolation Architecture for LLM-Based Systems

Add code
Mar 08, 2024
Figure 1 for SecGPT: An Execution Isolation Architecture for LLM-Based Systems
Figure 2 for SecGPT: An Execution Isolation Architecture for LLM-Based Systems
Figure 3 for SecGPT: An Execution Isolation Architecture for LLM-Based Systems
Figure 4 for SecGPT: An Execution Isolation Architecture for LLM-Based Systems
Viaarxiv icon

LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins

Add code
Sep 19, 2023
Figure 1 for LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins
Figure 2 for LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins
Figure 3 for LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins
Figure 4 for LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins
Viaarxiv icon

Is the U.S. Legal System Ready for AI's Challenges to Human Values?

Add code
Sep 05, 2023
Viaarxiv icon

Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance

Add code
Dec 08, 2022
Figure 1 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Figure 2 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Figure 3 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Figure 4 for Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance
Viaarxiv icon

Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection

Add code
Oct 26, 2021
Figure 1 for Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection
Figure 2 for Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection
Figure 3 for Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection
Figure 4 for Reliable and Trustworthy Machine Learning for Health Using Dataset Shift Detection
Viaarxiv icon

Disrupting Model Training with Adversarial Shortcuts

Add code
Jun 30, 2021
Figure 1 for Disrupting Model Training with Adversarial Shortcuts
Figure 2 for Disrupting Model Training with Adversarial Shortcuts
Figure 3 for Disrupting Model Training with Adversarial Shortcuts
Figure 4 for Disrupting Model Training with Adversarial Shortcuts
Viaarxiv icon