Picture for Z. Berkay Celik

Z. Berkay Celik

Purdue University

A Progressive Transformer for Unifying Binary Code Embedding and Knowledge Transfer

Add code
Dec 15, 2024
Viaarxiv icon

Enhancing LLM-based Autonomous Driving Agents to Mitigate Perception Attacks

Add code
Sep 22, 2024
Viaarxiv icon

Rethinking How to Evaluate Language Model Jailbreak

Add code
Apr 12, 2024
Viaarxiv icon

Software Engineering for Robotics: Future Research Directions; Report from the 2023 Workshop on Software Engineering for Robotics

Add code
Jan 22, 2024
Viaarxiv icon

Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions

Add code
Oct 03, 2023
Viaarxiv icon

New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning

Add code
Jul 28, 2021
Figure 1 for New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning
Figure 2 for New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning
Figure 3 for New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning
Figure 4 for New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning
Viaarxiv icon

What Do You See? Evaluation of Explainable Artificial Intelligence Interpretability through Neural Backdoors

Add code
Sep 22, 2020
Figure 1 for What Do You See? Evaluation of Explainable Artificial Intelligence  Interpretability through Neural Backdoors
Figure 2 for What Do You See? Evaluation of Explainable Artificial Intelligence  Interpretability through Neural Backdoors
Figure 3 for What Do You See? Evaluation of Explainable Artificial Intelligence  Interpretability through Neural Backdoors
Figure 4 for What Do You See? Evaluation of Explainable Artificial Intelligence  Interpretability through Neural Backdoors
Viaarxiv icon

Real-time Analysis of Privacy-aware IoT Applications

Add code
Nov 24, 2019
Figure 1 for Real-time Analysis of Privacy-aware IoT Applications
Figure 2 for Real-time Analysis of Privacy-aware IoT Applications
Figure 3 for Real-time Analysis of Privacy-aware IoT Applications
Figure 4 for Real-time Analysis of Privacy-aware IoT Applications
Viaarxiv icon

Detection under Privileged Information

Add code
Mar 31, 2018
Figure 1 for Detection under Privileged Information
Figure 2 for Detection under Privileged Information
Figure 3 for Detection under Privileged Information
Figure 4 for Detection under Privileged Information
Viaarxiv icon

Patient-Driven Privacy Control through Generalized Distillation

Add code
Oct 13, 2017
Figure 1 for Patient-Driven Privacy Control through Generalized Distillation
Figure 2 for Patient-Driven Privacy Control through Generalized Distillation
Figure 3 for Patient-Driven Privacy Control through Generalized Distillation
Figure 4 for Patient-Driven Privacy Control through Generalized Distillation
Viaarxiv icon