Search Results for author: Murtuza Jadliwala

Found 7 papers, 1 papers with code

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape

1 code implementation24 Apr 2024 Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath

Second, the emergence of \textit{vision foundation models} -- machine learning models trained on broad data that can be easily adapted to several downstream tasks -- can be misused by attackers to craft adversarial deepfakes that can evade existing defenses.

Towards a Game-theoretic Understanding of Explanation-based Membership Inference Attacks

no code implementations10 Apr 2024 Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

By means of a comprehensive set of simulations of the proposed game model, we assess different factors that can impact the capability of an adversary to launch MIA in such repeated interaction settings.

BayBFed: Bayesian Backdoor Defense for Federated Learning

no code implementations23 Jan 2023 Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi

However, as these approaches directly operate on client updates, their effectiveness depends on factors such as clients' data distribution or the adversary's attack strategies.

backdoor defense Federated Learning +1

A Game-theoretic Understanding of Repeated Explanations in ML Models

no code implementations5 Feb 2022 Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

This paper formally models the strategic repeated interactions between a system, comprising of a machine learning (ML) model and associated explanation method, and an end-user who is seeking a prediction/label and its explanation for a query/input, by means of game theory.

Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks

no code implementations22 Oct 2020 Mohd Sabra, Anindya Maiti, Murtuza Jadliwala

Due to recent world events, video calls have become the new norm for both personal and professional remote communication.

On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains

no code implementations16 Feb 2020 Tayebeh Rajab, Mohammad Hossein Manshaei, Mohammad Dakhilalian, Murtuza Jadliwala, Mohammad Ashiqur Rahman

To overcome this, committee-based approaches (e. g., Elastico) that partition the outstanding transaction set into shards and (randomly) select multiple committees to process these transactions in parallel have been proposed and have become very popular.

Cryptography and Security

A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains

no code implementations19 Sep 2018 Mohammad Hossein Manshaei, Murtuza Jadliwala, Anindya Maiti, Mahdi Fooladgar

However, one significant research gap is a lack of understanding of the strategic behavior of rational processors within committees in such shard-based consensus protocols.

Computer Science and Game Theory

Cannot find the paper you are looking for? You can Submit a new open access paper.