Posts by Collection

publications

A Hybrid Approach to Tiger Re-Identification

Published in ICCV 2019 Workshop (Computer Vision for Wildlife Conservation), 2019

We propose to utilize both deep learning and traditional SIFT descriptor-based matching for tiger re-identification.

WaveTransform: Crafting Adversarial Examples via Input Decomposition

Published in ECCV 2020 Workshop (Adversarial Robustness in the Real World), 2020

We introduce a novel class of adversarial attacks, namely ‘WaveTransform’, that creates adversarial noise corresponding to low-frequency and high-frequency subbands, separately (or in combination).

Simulating Network Paths with Recurrent Buffering Units

Published in AAAI 2023 (Association for the Advancement of Artificial Intelligence), 2023

We developed an end-to-end network path simulation model that embeds the semantics of a physical network, leveraging domain-specific insights from physical network paths and explicitly modelling unobservable cross-traffic using a new RNN-style architecture called Recurrent Buffering Unit (RBU).

Prϵϵmpt: Sanitizing Sensitive Prompts for LLMs

Published in AAAI 2024 Workshop (Privacy-Preserving Artificial Intelligence), 2023

We introduce a cryptographically inspired notion of a prompt sanitizer which transforms an input prompt to protect its sensitive tokens.