Aniruddha Saha
Aniruddha Saha
University of Maryland, College Park
Verified email at - Homepage
Cited by
Cited by
Hidden Trigger Backdoor Attacks
A Saha, A Subramanya, H Pirsiavash
Proceedings of the AAAI Conference on Artificial Intelligence 2020, 2019
Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs
S Kolouri, A Saha, H Pirsiavash, H Hoffmann
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
Backdoor Attacks on Self-Supervised Learning
A Saha, A Tejankar, SA Koohpayegani, H Pirsiavash
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
Role of Spatial Context in Adversarial Robustness for Object Detection
A Saha, A Subramanya, K Patil, H Pirsiavash
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
Baseline Defenses for Adversarial Attacks Against Aligned Language Models
N Jain, A Schwarzschild, Y Wen, G Somepalli, J Kirchenbauer, P Chiang, ...
arXiv preprint arXiv:2309.00614, 2023
On the Reliability of Watermarks for Large Language Models
J Kirchenbauer, J Geiping, Y Wen, M Shu, K Saifullah, K Kong, ...
arXiv preprint arXiv:2306.04634, 2023
Bring Your Own Data! Self-Supervised Evaluation for Large Language Models
N Jain, K Saifullah, Y Wen, J Kirchenbauer, M Shu, A Saha, M Goldblum, ...
arXiv preprint arXiv:2306.13651, 2023
NEFTune: Noisy Embeddings Improve Instruction Finetuning
N Jain, P Chiang, Y Wen, J Kirchenbauer, HM Chu, G Somepalli, ...
arXiv preprint arXiv:2310.05914, 2023
Backdoor Attacks on Vision Transformers
A Subramanya, A Saha, SA Koohpayegani, A Tejankar, H Pirsiavash
arXiv:2206.08477, 2022
An Adaptive Foreground-Background Separation Method for Effective Binarization of Document Images
B Das, S Bhowmik, A Saha, R Sarkar
Proceedings of the Eighth International Conference on Soft Computing and …, 2017
Spotting LLMs With Binoculars: Zero-Shot Detection of Machine-Generated Text
A Hans, A Schwarzschild, V Cherepanova, H Kazemi, A Saha, ...
arXiv preprint arXiv:2401.12070, 2024
Revisiting Image Classifier Training for Improved Certified Robust Defense against Adversarial Patches
A Saha, S Yu, A Norouzzadeh, WY Lin, CK Mummadi
arXiv preprint arXiv:2306.12610, 2023
Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion
H Souri, A Bansal, H Kazemi, L Fowl, A Saha, J Geiping, AG Wilson, ...
arXiv preprint arXiv:2403.16365, 2024
System and Method with Masking and Inpainting Strategy for Generic Defense Against Patch Attacks
A Saha, CK Mummadi, WY Lin, F Condessa
US Patent App. 17/949,003, 2024
System and Method with Masking for Certified Defense Against Adversarial Patch Attacks
S Yu, A Saha, CK Mummadi, WY Lin
US Patent App. 17/949,980, 2024
A Closer Look at Robustness of Vision Transformers to Backdoor Attacks
A Subramanya, SA Koohpayegani, A Saha, A Tejankar, H Pirsiavash
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer …, 2024
Backdoor Attacks in Computer Vision: Towards Adversarially Robust Machine Learning Models
A Saha
University of Maryland, Baltimore County, 2022
The system can't perform the operation now. Try again later.
Articles 1–17