Search Results for author: Bimal Viswanath

Found 8 papers, 4 papers with code

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape

1 code implementation24 Apr 2024 Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath

Second, the emergence of \textit{vision foundation models} -- machine learning models trained on broad data that can be easily adapted to several downstream tasks -- can be misused by attackers to craft adversarial deepfakes that can evade existing defenses.

Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models

no code implementations5 Apr 2021 Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath

The potential for fraudulent claims based on such generated 'fake' medical images is significant, and we demonstrate successful attacks on both X-rays and retinal fundus image modalities.

Style Transfer Translation

Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons

no code implementations15 Mar 2021 Ya Xiao, Salman Ahmed, Wenjia Song, Xinyang Ge, Bimal Viswanath, Danfeng Yao

Despite recent research efforts, the vision of automatic code generation through API recommendation has not been realized.

Code Generation

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification

1 code implementation7 Mar 2021 Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath

T-Miner employs a sequence-to-sequence (seq-2-seq) generative model that probes the suspicious classifier and learns to produce text sequences that are likely to contain the Trojan trigger.

text-classification Text Classification

Automated Crowdturfing Attacks and Defenses in Online Review Systems

no code implementations27 Aug 2017 Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Hai-Tao Zheng, Ben Y. Zhao

Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation online, but are limited by the costs of hiring and managing human workers.

Cryptography and Security Social and Information Networks

Cannot find the paper you are looking for? You can Submit a new open access paper.