Hidden Trigger Backdoor Attacks A Saha, A Subramanya, H Pirsiavash Proceedings of the AAAI Conference on Artificial Intelligence 2020, 2019 | 565 | 2019 |
Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs S Kolouri, A Saha, H Pirsiavash, H Hoffmann Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019 | 237 | 2019 |
Backdoor Attacks on Self-Supervised Learning A Saha, A Tejankar, SA Koohpayegani, H Pirsiavash Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 93 | 2021 |
Role of Spatial Context in Adversarial Robustness for Object Detection A Saha, A Subramanya, K Patil, H Pirsiavash Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019 | 73* | 2019 |
Baseline Defenses for Adversarial Attacks Against Aligned Language Models N Jain, A Schwarzschild, Y Wen, G Somepalli, J Kirchenbauer, P Chiang, ... arXiv preprint arXiv:2309.00614, 2023 | 39 | 2023 |
On the Reliability of Watermarks for Large Language Models J Kirchenbauer, J Geiping, Y Wen, M Shu, K Saifullah, K Kong, ... The Twelfth International Conference on Learning Representations (ICLR) 2024, 2023 | 28 | 2023 |
NEFTune: Noisy Embeddings Improve Instruction Finetuning N Jain, P Chiang, Y Wen, J Kirchenbauer, HM Chu, G Somepalli, ... The Twelfth International Conference on Learning Representations (ICLR) 2024, 2023 | 23 | 2023 |
Bring Your Own Data! Self-Supervised Evaluation for Large Language Models N Jain, K Saifullah, Y Wen, J Kirchenbauer, M Shu, A Saha, M Goldblum, ... arXiv preprint arXiv:2306.13651, 2023 | 16 | 2023 |
Backdoor Attacks on Vision Transformers A Subramanya, A Saha, SA Koohpayegani, A Tejankar, H Pirsiavash arXiv:2206.08477, 2022 | 9 | 2022 |
An Adaptive Foreground-Background Separation Method for Effective Binarization of Document Images B Das, S Bhowmik, A Saha, R Sarkar Proceedings of the Eighth International Conference on Soft Computing and …, 2017 | 8 | 2017 |
Spotting LLMs With Binoculars: Zero-Shot Detection of Machine-Generated Text A Hans, A Schwarzschild, V Cherepanova, H Kazemi, A Saha, ... Forty-first International Conference on Machine Learning (ICML) 2024, 2024 | 5 | 2024 |
Revisiting Image Classifier Training for Improved Certified Robust Defense against Adversarial Patches A Saha, S Yu, A Norouzzadeh, WY Lin, CK Mummadi arXiv preprint arXiv:2306.12610, 2023 | 2 | 2023 |
Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion H Souri, A Bansal, H Kazemi, L Fowl, A Saha, J Geiping, AG Wilson, ... arXiv preprint arXiv:2403.16365, 2024 | | 2024 |
System and Method with Masking and Inpainting Strategy for Generic Defense Against Patch Attacks A Saha, CK Mummadi, WY Lin, F Condessa US Patent App. 17/949,003, 2024 | | 2024 |
System and Method with Masking for Certified Defense Against Adversarial Patch Attacks S Yu, A Saha, CK Mummadi, WY Lin US Patent App. 17/949,980, 2024 | | 2024 |
A Closer Look at Robustness of Vision Transformers to Backdoor Attacks A Subramanya, SA Koohpayegani, A Saha, A Tejankar, H Pirsiavash Proceedings of the IEEE/CVF Winter Conference on Applications of Computer …, 2024 | | 2024 |
Backdoor Attacks in Computer Vision: Towards Adversarially Robust Machine Learning Models A Saha University of Maryland, Baltimore County, 2022 | | 2022 |