Skip to main content

Showing 1–9 of 9 results for author: Viswanath, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.16212  [pdf, other

    cs.CR cs.CV cs.LG

    An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape

    Authors: Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath

    Abstract: Deepfake or synthetic images produced using deep generative models pose serious risks to online platforms. This has triggered several research efforts to accurately detect deepfake images, achieving excellent performance on publicly available deepfake datasets. In this work, we study 8 state-of-the-art detectors and argue that they are far from being ready for deployment due to two recent developm… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: Accepted to IEEE S&P 2024; 19 pages, 10 figures

  2. arXiv:2210.09421  [pdf, other

    cs.CR cs.CL cs.LG

    Deepfake Text Detection: Limitations and Opportunities

    Authors: Jiameng Pu, Zain Sarwar, Sifat Muhammad Abdullah, Abdullah Rehman, Yoonjin Kim, Parantapa Bhattacharya, Mobin Javed, Bimal Viswanath

    Abstract: Recent advances in generative models for language have enabled the creation of convincing synthetic text or deepfake text. Prior work has demonstrated the potential for misuse of deepfake text to mislead content consumers. Therefore, deepfake text detection, the task of discriminating between human and machine-generated text, is becoming increasingly critical. Several defenses have been proposed f… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: Accepted to IEEE S&P 2023; First two authors contributed equally to this work; 18 pages, 7 figures

  3. Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models

    Authors: Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath

    Abstract: Advances in deep neural networks (DNNs) have shown tremendous promise in the medical domain. However, the deep learning tools that are helping the domain, can also be used against it. Given the prevalence of fraud in the healthcare domain, it is important to consider the adversarial use of DNNs in manipulating sensitive data that is crucial to patient healthcare. In this work, we present the desig… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

    Comments: Published in proceedings of the 5th European Symposium on Security and Privacy (EuroS&P '20)

  4. arXiv:2103.08747  [pdf, other

    cs.SE cs.AI cs.CR

    Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons

    Authors: Ya Xiao, Salman Ahmed, Wenjia Song, Xinyang Ge, Bimal Viswanath, Danfeng Yao

    Abstract: Despite recent research efforts, the vision of automatic code generation through API recommendation has not been realized. Accuracy and expressiveness challenges of API recommendation needs to be systematically addressed. We present a new neural network-based approach, Multi-HyLSTM for API recommendation --targeting cryptography-related code. Multi-HyLSTM leverages program analysis to guide the AP… ▽ More

    Submitted 17 March, 2021; v1 submitted 15 March, 2021; originally announced March 2021.

    Comments: 12 pages, 10 figures

    ACM Class: K.6.3

  5. arXiv:2103.04264  [pdf, other

    cs.CR cs.LG

    T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification

    Authors: Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath

    Abstract: Deep Neural Network (DNN) classifiers are known to be vulnerable to Trojan or backdoor attacks, where the classifier is manipulated such that it misclassifies any input containing an attacker-determined Trojan trigger. Backdoors compromise a model's integrity, thereby posing a severe threat to the landscape of DNN-based classification. While multiple defenses against such attacks exist for classif… ▽ More

    Submitted 10 March, 2021; v1 submitted 6 March, 2021; originally announced March 2021.

    Comments: Accepted to Usenix Security 2021; First two authors contributed equally to this work; 18 pages, 11 tables

  6. arXiv:2103.04263  [pdf, other

    cs.CR cs.CV

    Deepfake Videos in the Wild: Analysis and Detection

    Authors: Jiameng Pu, Neal Mangaokar, Lauren Kelly, Parantapa Bhattacharya, Kavya Sundaram, Mobin Javed, Bolun Wang, Bimal Viswanath

    Abstract: AI-manipulated videos, commonly known as deepfakes, are an emerging problem. Recently, researchers in academia and industry have contributed several (self-created) benchmark deepfake datasets, and deepfake detection algorithms. However, little effort has gone towards understanding deepfake videos in the wild, leading to a limited understanding of the real-world applicability of research contributi… ▽ More

    Submitted 10 March, 2021; v1 submitted 6 March, 2021; originally announced March 2021.

    Comments: Accepted to The Web Conference 2021; First two authors contributed equally to this work; 12 pages, 6 tables

  7. arXiv:1709.06686  [pdf, other

    cs.DC

    Sieve: Actionable Insights from Monitored Metrics in Microservices

    Authors: Jörg Thalheim, Antonio Rodrigues, Istemi Ekin Akkus, Pramod Bhatotia, Ruichuan Chen, Bimal Viswanath, Lei Jiao, Christof Fetzer

    Abstract: Major cloud computing operators provide powerful monitoring tools to understand the current (and prior) state of the distributed systems deployed in their infrastructure. While such tools provide a detailed monitoring mechanism at scale, they also pose a significant challenge for the application developers/operators to transform the huge space of monitored metrics into useful insights. These insig… ▽ More

    Submitted 19 September, 2017; originally announced September 2017.

    Comments: This technical report is an extended version of our conference publication: Jörg Thalheim, Antonio Rodrigues, Istemi Ekin Akkus, Pramod Bhatotia, Ruichuan Chen, Bimal Viswanath, Lei Jiao, and Christof Fetzer. Sieve: Actionable Insights from Monitored Metrics in Distributed Systems. In Proceedings of Middleware '17, Las Vegas, NV, USA, December 11 - 15, 2017

  8. arXiv:1708.08151  [pdf, other

    cs.CR cs.SI

    Automated Crowdturfing Attacks and Defenses in Online Review Systems

    Authors: Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao

    Abstract: Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation online, but are limited by the costs of hiring and managing human workers. In this paper, we identify a new class of attacks that leverage deep learning language models (Recurrent Neural Networks or RNNs) to automate the generation of fake online reviews for products and services. Not only are these attacks… ▽ More

    Submitted 7 September, 2017; v1 submitted 27 August, 2017; originally announced August 2017.

  9. arXiv:1612.00766  [pdf, other

    cs.CR

    I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions

    Authors: Anupama Aggarwal, Bimal Viswanath, Saravana Kumar, Ayush Shah, Liang Zhang, Ponnurangam Kumaraguru

    Abstract: Several studies have been conducted on understanding third-party user tracking on the web. However, web trackers can only track users on sites where they are embedded by the publisher, thus obtaining a fragmented view of a user's online footprint. In this work, we investigate a different form of user tracking, where browser extensions are repurposed to capture the complete online activities of a u… ▽ More

    Submitted 3 May, 2018; v1 submitted 2 December, 2016; originally announced December 2016.