Search Results for author: Hojjat Aghakhani

Found 4 papers, 3 papers with code

TrojanPuzzle: Covertly Poisoning Code-Suggestion Models

1 code implementation6 Jan 2023 Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim

To achieve this, prior attacks explicitly inject the insecure code payload into the training data, making the poison data detectable by static analysis tools that can remove such malicious data from the training set.

Data Poisoning

VenoMave: Targeted Poisoning Against Speech Recognition

1 code implementation21 Oct 2020 Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna

In a more realistic scenario, when the target audio waveform is played over the air in different rooms, VENOMAVE maintains a success rate of up to 73. 3%.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +3

Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability

1 code implementation1 May 2020 Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna

Our attack, Bullseye Polytope, improves the attack success rate of the current state-of-the-art by 26. 75% in end-to-end transfer learning, while increasing attack speed by a factor of 12.

Transfer Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.