Picture for Manaar Alam

Manaar Alam

LLMPot: Automated LLM-based Industrial Protocol and Physical Process Emulation for ICS Honeypots

Add code
May 09, 2024
Viaarxiv icon

Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

Add code
Feb 19, 2024
Viaarxiv icon

HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis

Add code
Jun 07, 2023
Figure 1 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 2 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 3 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 4 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Viaarxiv icon

Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning

Add code
Apr 20, 2023
Figure 1 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 2 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 3 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 4 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Viaarxiv icon

Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries

Add code
Aug 18, 2022
Figure 1 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Figure 2 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Figure 3 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Figure 4 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Viaarxiv icon

On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel

Add code
Aug 03, 2022
Figure 1 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Figure 2 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Figure 3 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Figure 4 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Viaarxiv icon

PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function

Add code
Dec 09, 2021
Figure 1 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Figure 2 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Figure 3 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Figure 4 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Viaarxiv icon

Deep-Lock: Secure Authorization for Deep Neural Networks

Add code
Aug 13, 2020
Figure 1 for Deep-Lock: Secure Authorization for Deep Neural Networks
Figure 2 for Deep-Lock: Secure Authorization for Deep Neural Networks
Viaarxiv icon

Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications

Add code
Feb 05, 2019
Figure 1 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 2 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 3 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 4 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Viaarxiv icon

How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?

Add code
Nov 13, 2018
Figure 1 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Figure 2 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Figure 3 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Figure 4 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Viaarxiv icon