no code implementations • 17 Apr 2024 • Md Athikul Islam, Edoardo Serra, Sushil Jajodia
Adversarial attacks pose significant challenges to deep neural networks (DNNs) such as Transformer models in natural language processing (NLP).
1 code implementation • 17 Aug 2022 • Jihyeon Hyeong, Jayoung Kim, Noseong Park, Sushil Jajodia
Tabular data typically contains private and important information; thus, precautions must be taken before they are shared with others.
no code implementations • 30 Oct 2020 • Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini
To this date, CAPTCHAs have served as the first line of defense preventing unauthorized access by (malicious) bots to web-based services, while at the same time maintaining a trouble-free experience for human visitors.
no code implementations • 13 Oct 2018 • Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam
In order to explain this observation, we extend the earlier RL model to a game model and show that there exists defender policies that can be robust against any adversarial policy.
no code implementations • COLING 2018 • Prakruthi Karuna, Hemant Purohit, {\"O}zlem Uzuner, Sushil Jajodia, Rajesh Ganesan
We can generate fake text documents by obscuring the salient information in legit text documents.
no code implementations • 9 Jun 2018 • Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim
We call this property model compatibility.
Databases Cryptography and Security H.3.4; I.2; K.6.5