Search Results for author: Mazal Bethany

Found 3 papers, 2 papers with code

Image Safeguarding: Reasoning with Conditional Vision Language Model and Obfuscating Unsafe Content Counterfactually

1 code implementation19 Jan 2024 Mazal Bethany, Brandon Wherry, Nishant Vishwamitra, Peyman Najafirad

This process involves addressing two key problems: (1) the reason for obfuscating unsafe images demands the platform to provide an accurate rationale that must be grounded in unsafe image-specific attributes, and (2) the unsafe regions in the image must be minimally obfuscated while still depicting the safe regions.

counterfactual Counterfactual Explanation +2

Large Language Model Lateral Spear Phishing: A Comparative Study in Large-Scale Organizational Settings

no code implementations18 Jan 2024 Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nishant Vishwamitra, Peyman Najafirad

The critical threat of phishing emails has been further exacerbated by the potential of LLMs to generate highly targeted, personalized, and automated spear phishing attacks.

Language Modelling Large Language Model

Deciphering Textual Authenticity: A Generalized Strategy through the Lens of Large Language Semantics for Detecting Human vs. Machine-Generated Text

1 code implementation17 Jan 2024 Mazal Bethany, Brandon Wherry, Emet Bethany, Nishant Vishwamitra, Anthony Rios, Peyman Najafirad

We first study the effectiveness of state-of-the-art approaches and find that they are severely limited against text produced by diverse generators and domains in the real world.

Binary Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.