Picture for Ashish Hooda

Ashish Hooda

Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks

Add code
Oct 05, 2024
Figure 1 for Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks
Figure 2 for Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks
Figure 3 for Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks
Figure 4 for Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks
Viaarxiv icon

PolicyLR: A Logic Representation For Privacy Policies

Add code
Aug 27, 2024
Figure 1 for PolicyLR: A Logic Representation For Privacy Policies
Figure 2 for PolicyLR: A Logic Representation For Privacy Policies
Figure 3 for PolicyLR: A Logic Representation For Privacy Policies
Figure 4 for PolicyLR: A Logic Representation For Privacy Policies
Viaarxiv icon

Synthetic Counterfactual Faces

Add code
Jul 18, 2024
Figure 1 for Synthetic Counterfactual Faces
Figure 2 for Synthetic Counterfactual Faces
Figure 3 for Synthetic Counterfactual Faces
Figure 4 for Synthetic Counterfactual Faces
Viaarxiv icon

PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails

Add code
Feb 24, 2024
Figure 1 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 2 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 3 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 4 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Viaarxiv icon

Do Large Code Models Understand Programming Concepts? A Black-box Approach

Add code
Feb 23, 2024
Figure 1 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Figure 2 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Figure 3 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Figure 4 for Do Large Code Models Understand Programming Concepts? A Black-box Approach
Viaarxiv icon

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Add code
Jul 30, 2023
Viaarxiv icon

Investigating Stateful Defenses Against Black-Box Adversarial Examples

Add code
Mar 17, 2023
Viaarxiv icon

SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks

Add code
Dec 16, 2022
Viaarxiv icon

Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance

Add code
Dec 08, 2022
Viaarxiv icon

Towards Adversarially Robust Deepfake Detection: An Ensemble Approach

Add code
Feb 11, 2022
Figure 1 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Figure 2 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Figure 3 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Figure 4 for Towards Adversarially Robust Deepfake Detection: An Ensemble Approach
Viaarxiv icon