Picture for Inderjeet Singh

Inderjeet Singh

Learning to Collaborate: An Orchestrated-Decentralized Framework for Peer-to-Peer LLM Federation

Add code
Jan 23, 2026
Viaarxiv icon

DIESEL -- Dynamic Inference-Guidance via Evasion of Semantic Embeddings in LLMs

Add code
Nov 28, 2024
Viaarxiv icon

Insights and Current Gaps in Open-Source LLM Vulnerability Scanners: A Comparative Analysis

Add code
Oct 21, 2024
Figure 1 for Insights and Current Gaps in Open-Source LLM Vulnerability Scanners: A Comparative Analysis
Figure 2 for Insights and Current Gaps in Open-Source LLM Vulnerability Scanners: A Comparative Analysis
Figure 3 for Insights and Current Gaps in Open-Source LLM Vulnerability Scanners: A Comparative Analysis
Figure 4 for Insights and Current Gaps in Open-Source LLM Vulnerability Scanners: A Comparative Analysis
Viaarxiv icon

Knowledge Distillation-Empowered Digital Twin for Anomaly Detection

Add code
Sep 12, 2023
Figure 1 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Figure 2 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Figure 3 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Figure 4 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Viaarxiv icon

Simultaneous Adversarial Attacks On Multiple Face Recognition System Components

Add code
Apr 11, 2023
Figure 1 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 2 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 3 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 4 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Viaarxiv icon

Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples

Add code
Dec 06, 2022
Viaarxiv icon

Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

Add code
Mar 23, 2022
Figure 1 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 2 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 3 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 4 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Viaarxiv icon

Anomaly Detection using Capsule Networks for High-dimensional Datasets

Add code
Dec 28, 2021
Figure 1 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Figure 2 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Figure 3 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Figure 4 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Viaarxiv icon

On Brightness Agnostic Adversarial Examples Against Face Recognition Systems

Add code
Sep 29, 2021
Figure 1 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 2 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 3 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 4 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Viaarxiv icon

Dodging Attack Using Carefully Crafted Natural Makeup

Add code
Sep 14, 2021
Figure 1 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 2 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 3 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 4 for Dodging Attack Using Carefully Crafted Natural Makeup
Viaarxiv icon