1 code implementation • 24 Apr 2024 • Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath
Second, the emergence of \textit{vision foundation models} -- machine learning models trained on broad data that can be easily adapted to several downstream tasks -- can be misused by attackers to craft adversarial deepfakes that can evade existing defenses.
no code implementations • 10 Apr 2024 • Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti
By means of a comprehensive set of simulations of the proposed game model, we assess different factors that can impact the capability of an adversary to launch MIA in such repeated interaction settings.
no code implementations • 23 Jan 2023 • Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi
However, as these approaches directly operate on client updates, their effectiveness depends on factors such as clients' data distribution or the adversary's attack strategies.
no code implementations • 5 Feb 2022 • Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti
This paper formally models the strategic repeated interactions between a system, comprising of a machine learning (ML) model and associated explanation method, and an end-user who is seeking a prediction/label and its explanation for a query/input, by means of game theory.
no code implementations • 22 Oct 2020 • Mohd Sabra, Anindya Maiti, Murtuza Jadliwala
Due to recent world events, video calls have become the new norm for both personal and professional remote communication.
no code implementations • 16 Feb 2020 • Tayebeh Rajab, Mohammad Hossein Manshaei, Mohammad Dakhilalian, Murtuza Jadliwala, Mohammad Ashiqur Rahman
To overcome this, committee-based approaches (e. g., Elastico) that partition the outstanding transaction set into shards and (randomly) select multiple committees to process these transactions in parallel have been proposed and have become very popular.
Cryptography and Security
no code implementations • 19 Sep 2018 • Mohammad Hossein Manshaei, Murtuza Jadliwala, Anindya Maiti, Mahdi Fooladgar
However, one significant research gap is a lack of understanding of the strategic behavior of rational processors within committees in such shard-based consensus protocols.
Computer Science and Game Theory