Search Results for author: Bijeeta Pal

Found 2 papers, 1 papers with code

To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers

no code implementations8 Jan 2020 Bijeeta Pal, Shruti Tople

Thus, our results motivate the need for designing training techniques that are robust to unintended feature learning, specifically for transfer learned models.

Binary Classification Fake News Detection +2

Protocols for Checking Compromised Credentials

1 code implementation31 May 2019 Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart

Current widely deployed C3 services have the user share a small prefix of a hash computed over the user's password.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.