Masquerade


When LoRA Betrays: Backdooring Text-to-Image Models by Masquerading as Benign Adapters

Add code
Feb 25, 2026
Viaarxiv icon

SafeThinker: Reasoning about Risk to Deepen Safety Beyond Shallow Alignment

Add code
Jan 23, 2026
Viaarxiv icon

Masquerade: Learning from In-the-wild Human Videos using Data-Editing

Add code
Aug 13, 2025
Figure 1 for Masquerade: Learning from In-the-wild Human Videos using Data-Editing
Figure 2 for Masquerade: Learning from In-the-wild Human Videos using Data-Editing
Figure 3 for Masquerade: Learning from In-the-wild Human Videos using Data-Editing
Figure 4 for Masquerade: Learning from In-the-wild Human Videos using Data-Editing
Viaarxiv icon

Multi-Agent Actor-Critic Generative AI for Query Resolution and Analysis

Add code
Feb 17, 2025
Viaarxiv icon

Can Features for Phishing URL Detection Be Trusted Across Diverse Datasets? A Case Study with Explainable AI

Add code
Nov 14, 2024
Figure 1 for Can Features for Phishing URL Detection Be Trusted Across Diverse Datasets? A Case Study with Explainable AI
Figure 2 for Can Features for Phishing URL Detection Be Trusted Across Diverse Datasets? A Case Study with Explainable AI
Figure 3 for Can Features for Phishing URL Detection Be Trusted Across Diverse Datasets? A Case Study with Explainable AI
Figure 4 for Can Features for Phishing URL Detection Be Trusted Across Diverse Datasets? A Case Study with Explainable AI
Viaarxiv icon

Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning

Add code
Aug 10, 2024
Figure 1 for Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning
Figure 2 for Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning
Figure 3 for Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning
Figure 4 for Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning
Viaarxiv icon

Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN

Add code
Jun 19, 2024
Figure 1 for Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN
Figure 2 for Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN
Figure 3 for Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN
Figure 4 for Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN
Viaarxiv icon

Towards Embedding Dynamic Personas in Interactive Robots: Masquerading Animated Social Kinematics (MASK)

Add code
Mar 15, 2024
Figure 1 for Towards Embedding Dynamic Personas in Interactive Robots: Masquerading Animated Social Kinematics (MASK)
Figure 2 for Towards Embedding Dynamic Personas in Interactive Robots: Masquerading Animated Social Kinematics (MASK)
Figure 3 for Towards Embedding Dynamic Personas in Interactive Robots: Masquerading Animated Social Kinematics (MASK)
Figure 4 for Towards Embedding Dynamic Personas in Interactive Robots: Masquerading Animated Social Kinematics (MASK)
Viaarxiv icon

On the Role of Similarity in Detecting Masquerading Files

Add code
Feb 17, 2024
Figure 1 for On the Role of Similarity in Detecting Masquerading Files
Viaarxiv icon

Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning on CAN Messages

Add code
Nov 13, 2023
Figure 1 for Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning on CAN Messages
Figure 2 for Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning on CAN Messages
Figure 3 for Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning on CAN Messages
Figure 4 for Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning on CAN Messages
Viaarxiv icon