Picture for Jaydip Sen

Jaydip Sen

A Comparative Study of Hyperparameter Tuning Methods

Add code
Aug 29, 2024
Viaarxiv icon

Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks

Add code
Aug 20, 2024
Figure 1 for Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks
Figure 2 for Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks
Figure 3 for Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks
Figure 4 for Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks
Viaarxiv icon

Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings: An Indian Perspective

Add code
Aug 08, 2024
Viaarxiv icon

Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent

Add code
Jul 29, 2024
Figure 1 for Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent
Figure 2 for Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent
Figure 3 for Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent
Figure 4 for Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent
Viaarxiv icon

Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation

Add code
Jun 18, 2024
Figure 1 for Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation
Figure 2 for Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation
Viaarxiv icon

Boosting Digital Safeguards: Blending Cryptography and Steganography

Add code
Apr 11, 2024
Figure 1 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Figure 2 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Figure 3 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Figure 4 for Boosting Digital Safeguards: Blending Cryptography and Steganography
Viaarxiv icon

Semantic Stealth: Adversarial Text Attacks on NLP Using Several Methods

Add code
Apr 08, 2024
Viaarxiv icon

Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism

Add code
Apr 05, 2024
Figure 1 for Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism
Figure 2 for Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism
Figure 3 for Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism
Figure 4 for Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism
Viaarxiv icon

Generative AI-Based Text Generation Methods Using Pre-Trained GPT-2 Model

Add code
Apr 02, 2024
Viaarxiv icon

Information Security and Privacy in the Digital World: Some Selected Topics

Add code
Mar 30, 2024
Viaarxiv icon