Picture for Jaydip Sen

Jaydip Sen

Determination Of Structural Cracks Using Deep Learning Frameworks

Add code
Jul 03, 2025
Viaarxiv icon

Adversarial Text Generation with Dynamic Contextual Perturbation

Add code
Jun 10, 2025
Viaarxiv icon

Context-Enhanced Contrastive Search for Improved LLM Text Generation

Add code
Apr 22, 2025
Viaarxiv icon

Adversarial Robustness through Dynamic Ensemble Learning

Add code
Dec 20, 2024
Viaarxiv icon

A Comparative Study of Hyperparameter Tuning Methods

Add code
Aug 29, 2024
Viaarxiv icon

Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks

Add code
Aug 20, 2024
Figure 1 for Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks
Figure 2 for Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks
Figure 3 for Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks
Figure 4 for Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks
Viaarxiv icon

Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings: An Indian Perspective

Add code
Aug 08, 2024
Viaarxiv icon

Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent

Add code
Jul 29, 2024
Figure 1 for Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent
Figure 2 for Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent
Figure 3 for Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent
Figure 4 for Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent
Viaarxiv icon

Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation

Add code
Jun 18, 2024
Figure 1 for Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation
Figure 2 for Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation
Viaarxiv icon

Boosting Digital Safeguards: Blending Cryptography and Steganography

Add code
Apr 11, 2024
Figure 1 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Figure 2 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Figure 3 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Figure 4 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Viaarxiv icon