Picture for Awais Khan

Awais Khan

Plant Pathology and Plant-Microbe Biology Section, Cornell University, Geneva, NY

Instruction-Tuned LLMs for Parsing and Mining Unstructured Logs on Leadership HPC Systems

Add code
Apr 06, 2026
Viaarxiv icon

TRACE: Training-Free Partial Audio Deepfake Detection via Embedding Trajectory Analysis of Speech Foundation Models

Add code
Apr 01, 2026
Viaarxiv icon

Adversarial Attacks on Audio Deepfake Detection: A Benchmark and Comparative Study

Add code
Sep 08, 2025
Viaarxiv icon

SHIELD: A Secure and Highly Enhanced Integrated Learning for Robust Deepfake Detection against Adversarial Attacks

Add code
Jul 17, 2025
Figure 1 for SHIELD: A Secure and Highly Enhanced Integrated Learning for Robust Deepfake Detection against Adversarial Attacks
Figure 2 for SHIELD: A Secure and Highly Enhanced Integrated Learning for Robust Deepfake Detection against Adversarial Attacks
Figure 3 for SHIELD: A Secure and Highly Enhanced Integrated Learning for Robust Deepfake Detection against Adversarial Attacks
Figure 4 for SHIELD: A Secure and Highly Enhanced Integrated Learning for Robust Deepfake Detection against Adversarial Attacks
Viaarxiv icon

Transferable Adversarial Attacks on Audio Deepfake Detection

Add code
Jan 21, 2025
Figure 1 for Transferable Adversarial Attacks on Audio Deepfake Detection
Figure 2 for Transferable Adversarial Attacks on Audio Deepfake Detection
Figure 3 for Transferable Adversarial Attacks on Audio Deepfake Detection
Figure 4 for Transferable Adversarial Attacks on Audio Deepfake Detection
Viaarxiv icon

Securing Social Media Against Deepfakes using Identity, Behavioral, and Geometric Signatures

Add code
Dec 07, 2024
Figure 1 for Securing Social Media Against Deepfakes using Identity, Behavioral, and Geometric Signatures
Figure 2 for Securing Social Media Against Deepfakes using Identity, Behavioral, and Geometric Signatures
Figure 3 for Securing Social Media Against Deepfakes using Identity, Behavioral, and Geometric Signatures
Figure 4 for Securing Social Media Against Deepfakes using Identity, Behavioral, and Geometric Signatures
Viaarxiv icon

Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices

Add code
Nov 29, 2024
Figure 1 for Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices
Figure 2 for Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices
Figure 3 for Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices
Figure 4 for Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices
Viaarxiv icon

Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake Detection

Add code
Oct 05, 2023
Figure 1 for Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake Detection
Figure 2 for Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake Detection
Figure 3 for Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake Detection
Figure 4 for Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake Detection
Viaarxiv icon

Bridging the Spoof Gap: A Unified Parallel Aggregation Network for Voice Presentation Attacks

Add code
Sep 19, 2023
Viaarxiv icon

Frame-to-Utterance Convergence: A Spectra-Temporal Approach for Unified Spoofing Detection

Add code
Sep 18, 2023
Viaarxiv icon