Search Results for author: Shirin Nilizadeh

Found 9 papers, 1 papers with code

DifFuzz: Differential Fuzzing for Side-Channel Analysis

2 code implementations16 Nov 2018 Shirin Nilizadeh, Yannic Noller, Corina S. Pasareanu

For this paper, we present an implementation that targets analysis of Java programs, and uses and extends the Kelinci and AFL fuzzers.

Cryptography and Security Software Engineering

Audio Attacks and Defenses against AED Systems -- A Practical Study

no code implementations14 Jun 2021 Rodrigo dos Santos, Shirin Nilizadeh

We show that an adversary can focus on audio adversarial inputs to cause AED systems to misclassify, achieving high success rates, even when we use small levels of a given type of noisy disturbance.

Audio Denoising Denoising +3

Evaluating the effectiveness of Phishing Reports on Twitter

no code implementations13 Nov 2021 Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh

Moreover, nearly 31% of these URLs were still active even after a week of them being reported, with 27% of them being detected by very few anti-phishing tools, suggesting that a large majority of these reports remain undiscovered, despite the majority of the follower base of these accounts being security focused users.

StyleGAN as a Utility-Preserving Face De-identification Method

no code implementations5 Dec 2022 Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh

In this paper, for the first time, we also performed a carefully designed user study to examine both privacy and utility-preserving properties of StyleGAN0-3, 0-4, and 0-5, as well as CIAGAN and DeepPrivacy from the human observers' perspectives.

De-identification Face Detection

Generating Phishing Attacks using ChatGPT

no code implementations9 May 2023 Sayak Saha Roy, Krishna Vamsi Naragam, Shirin Nilizadeh

The ability of ChatGPT to generate human-like responses and understand context has made it a popular tool for conversational agents, content creation, data analysis, and research and innovation.

From Chatbots to PhishBots? -- Preventing Phishing scams created using ChatGPT, Google Bard and Claude

no code implementations29 Oct 2023 Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh

As a countermeasure, we build a BERT-based automated detection tool that can be used for the early detection of malicious prompts to prevent LLMs from generating phishing content.

Prompt Engineering

Vulnerabilities Unveiled: Adversarially Attacking a Multimodal Vision Language Model for Pathology Imaging

no code implementations4 Jan 2024 Jai Prakash Veerla, Poojitha Thota, Partha Sai Guttikonda, Shirin Nilizadeh, Jacob M. Luber

In the dynamic landscape of medical artificial intelligence, this study explores the vulnerabilities of the Pathology Language-Image Pretraining (PLIP) model, a Vision Language Foundation model, under targeted adversarial conditions.

Domain Adaptation Language Modelling

Cannot find the paper you are looking for? You can Submit a new open access paper.