no code implementations • 5 Dec 2022 • Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh
Several face de-identification methods have been proposed to preserve users' privacy by obscuring their faces.
no code implementations • 13 Nov 2021 • Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh
Moreover, nearly 31% of these URLs were still active even after a week of them being reported, with 27% of them being detected by very few anti-phishing tools, suggesting that a large majority of these reports remain undiscovered, despite the majority of the follower base of these accounts being security focused users.
no code implementations • EMNLP (BlackboxNLP) 2021 • Anahita Samadi, Debapriya Banerjee, Shirin Nilizadeh
We also found that attacks against TF IDF is more successful compared to USE.
no code implementations • 14 Jun 2021 • Rodrigo dos Santos, Shirin Nilizadeh
We show that an adversary can focus on audio adversarial inputs to cause AED systems to misclassify, achieving high success rates, even when we use small levels of a given type of noisy disturbance.
2 code implementations • 16 Nov 2018 • Shirin Nilizadeh, Yannic Noller, Corina S. Pasareanu
For this paper, we present an implementation that targets analysis of Java programs, and uses and extends the Kelinci and AFL fuzzers.
Cryptography and Security Software Engineering
no code implementations • 25 May 2018 • Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna
These results indicate that GANs can be effective for text classification tasks.