Search Results for author: Murtuza Jadliwala

Found 11 papers, 1 papers with code

Promptly Yours? A Human Subject Study on Prompt Inference in AI-Generated Art

no code implementations10 Oct 2024 Khoi Trinh, Joseph Spracklen, Raveen Wijewickrama, Bimal Viswanath, Murtuza Jadliwala, Anindya Maiti

The emerging field of AI-generated art has witnessed the rise of prompt marketplaces, where creators can purchase, sell, or share prompts for generating unique artworks.

Language Modelling Large Language Model

Unintentional Security Flaws in Code: Automated Defense via Root Cause Analysis

no code implementations30 Aug 2024 Nafis Tanveer Islam, Mazal Bethany, Dylan Manuel, Murtuza Jadliwala, Peyman Najafirad

To address these challenges, we conducted a comprehensive study evaluating the efficacy of existing methods in helping junior developers secure their code.

Spiking Neural Networks in Vertical Federated Learning: Performance Trade-offs

no code implementations24 Jul 2024 Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala

We implement two different federated learning architectures -- with model splitting and without model splitting -- that have different privacy and performance implications.

Vertical Federated Learning

We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs

no code implementations12 Jun 2024 Joseph Spracklen, Raveen Wijewickrama, A H M Nazmus Sakib, Anindya Maiti, Bimal Viswanath, Murtuza Jadliwala

The reliance of popular programming languages such as Python and JavaScript on centralized package repositories and open-source software, combined with the emergence of code-generating Large Language Models (LLMs), has created a new type of threat to the software supply chain: package hallucinations.

Code Generation Hallucination +1

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape

1 code implementation24 Apr 2024 Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath

Second, the emergence of \textit{vision foundation models} -- machine learning models trained on broad data that can be easily adapted to several downstream tasks -- can be misused by attackers to craft adversarial deepfakes that can evade existing defenses.

Adversarial Attack Face Swapping

Towards a Game-theoretic Understanding of Explanation-based Membership Inference Attacks

no code implementations10 Apr 2024 Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

By means of a comprehensive set of simulations of the proposed game model, we assess different factors that can impact the capability of an adversary to launch MIA in such repeated interaction settings.

BayBFed: Bayesian Backdoor Defense for Federated Learning

no code implementations23 Jan 2023 Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi

However, as these approaches directly operate on client updates, their effectiveness depends on factors such as clients' data distribution or the adversary's attack strategies.

backdoor defense Federated Learning +1

A Game-theoretic Understanding of Repeated Explanations in ML Models

no code implementations5 Feb 2022 Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

This paper formally models the strategic repeated interactions between a system, comprising of a machine learning (ML) model and associated explanation method, and an end-user who is seeking a prediction/label and its explanation for a query/input, by means of game theory.

Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks

no code implementations22 Oct 2020 Mohd Sabra, Anindya Maiti, Murtuza Jadliwala

Due to recent world events, video calls have become the new norm for both personal and professional remote communication.

On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains

no code implementations16 Feb 2020 Tayebeh Rajab, Mohammad Hossein Manshaei, Mohammad Dakhilalian, Murtuza Jadliwala, Mohammad Ashiqur Rahman

To overcome this, committee-based approaches (e. g., Elastico) that partition the outstanding transaction set into shards and (randomly) select multiple committees to process these transactions in parallel have been proposed and have become very popular.

Cryptography and Security

A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains

no code implementations19 Sep 2018 Mohammad Hossein Manshaei, Murtuza Jadliwala, Anindya Maiti, Mahdi Fooladgar

However, one significant research gap is a lack of understanding of the strategic behavior of rational processors within committees in such shard-based consensus protocols.

Computer Science and Game Theory

Cannot find the paper you are looking for? You can Submit a new open access paper.