Picture for Shirin Nilizadeh

Shirin Nilizadeh

Attacks against Abstractive Text Summarization Models through Lead Bias and Influence Functions

Add code
Oct 26, 2024
Viaarxiv icon

Utilizing Large Language Models to Optimize the Detection and Explainability of Phishing Websites

Add code
Aug 11, 2024
Viaarxiv icon

Vulnerabilities Unveiled: Adversarially Attacking a Multimodal Vision Language Model for Pathology Imaging

Add code
Jan 08, 2024
Viaarxiv icon

From Chatbots to PhishBots? -- Preventing Phishing scams created using ChatGPT, Google Bard and Claude

Add code
Oct 29, 2023
Viaarxiv icon

Generating Phishing Attacks using ChatGPT

Add code
May 09, 2023
Viaarxiv icon

StyleGAN as a Utility-Preserving Face De-identification Method

Add code
Dec 05, 2022
Viaarxiv icon

Evaluating the effectiveness of Phishing Reports on Twitter

Add code
Nov 13, 2021
Figure 1 for Evaluating the effectiveness of Phishing Reports on Twitter
Figure 2 for Evaluating the effectiveness of Phishing Reports on Twitter
Figure 3 for Evaluating the effectiveness of Phishing Reports on Twitter
Figure 4 for Evaluating the effectiveness of Phishing Reports on Twitter
Viaarxiv icon

Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms

Add code
Aug 12, 2021
Figure 1 for Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms
Figure 2 for Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms
Figure 3 for Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms
Figure 4 for Attacks against Ranking Algorithms with Text Embeddings: a Case Study on Recruitment Algorithms
Viaarxiv icon

Audio Attacks and Defenses against AED Systems -- A Practical Study

Add code
Jun 25, 2021
Figure 1 for Audio Attacks and Defenses against AED Systems -- A Practical Study
Figure 2 for Audio Attacks and Defenses against AED Systems -- A Practical Study
Figure 3 for Audio Attacks and Defenses against AED Systems -- A Practical Study
Figure 4 for Audio Attacks and Defenses against AED Systems -- A Practical Study
Viaarxiv icon

Detecting Deceptive Reviews using Generative Adversarial Networks

Add code
May 25, 2018
Figure 1 for Detecting Deceptive Reviews using Generative Adversarial Networks
Figure 2 for Detecting Deceptive Reviews using Generative Adversarial Networks
Figure 3 for Detecting Deceptive Reviews using Generative Adversarial Networks
Viaarxiv icon