Picture for Bimal Viswanath

Bimal Viswanath

Promptly Yours? A Human Subject Study on Prompt Inference in AI-Generated Art

Add code
Oct 10, 2024
Figure 1 for Promptly Yours? A Human Subject Study on Prompt Inference in AI-Generated Art
Figure 2 for Promptly Yours? A Human Subject Study on Prompt Inference in AI-Generated Art
Figure 3 for Promptly Yours? A Human Subject Study on Prompt Inference in AI-Generated Art
Figure 4 for Promptly Yours? A Human Subject Study on Prompt Inference in AI-Generated Art
Viaarxiv icon

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape

Add code
Apr 24, 2024
Viaarxiv icon

Deepfake Text Detection: Limitations and Opportunities

Add code
Oct 17, 2022
Figure 1 for Deepfake Text Detection: Limitations and Opportunities
Figure 2 for Deepfake Text Detection: Limitations and Opportunities
Figure 3 for Deepfake Text Detection: Limitations and Opportunities
Figure 4 for Deepfake Text Detection: Limitations and Opportunities
Viaarxiv icon

Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models

Add code
Apr 05, 2021
Figure 1 for Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Figure 2 for Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Figure 3 for Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Figure 4 for Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Viaarxiv icon

Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons

Add code
Mar 18, 2021
Figure 1 for Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons
Figure 2 for Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons
Figure 3 for Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons
Figure 4 for Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons
Viaarxiv icon

Deepfake Videos in the Wild: Analysis and Detection

Add code
Mar 11, 2021
Figure 1 for Deepfake Videos in the Wild: Analysis and Detection
Figure 2 for Deepfake Videos in the Wild: Analysis and Detection
Figure 3 for Deepfake Videos in the Wild: Analysis and Detection
Figure 4 for Deepfake Videos in the Wild: Analysis and Detection
Viaarxiv icon

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification

Add code
Mar 11, 2021
Figure 1 for T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
Figure 2 for T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
Figure 3 for T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
Figure 4 for T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification
Viaarxiv icon