Zobrazeno 1 - 10
of 154
pro vyhledávání: '"Hassan, Jameel"'
We present a quantum protocol which securely and implicitly implements a random shuffle to realize differential privacy in the shuffle model. The shuffle model of differential privacy amplifies privacy achievable via local differential privacy by ran
Externí odkaz:
http://arxiv.org/abs/2409.04026
Autor:
Salman, Muhammad, Zhao, Benjamin Zi Hao, Asghar, Hassan Jameel, Ikram, Muhammad, Kaushik, Sidharth, Kaafar, Mohamed Ali
Adversarial examples add imperceptible alterations to inputs with the objective to induce misclassification in machine learning models. They have been demonstrated to pose significant challenges in domains like image classification, with results show
Externí odkaz:
http://arxiv.org/abs/2408.02310
Local differential privacy (LDP) is an efficient solution for providing privacy to client's sensitive data while simultaneously releasing aggregate statistics without relying on a trusted central server (aggregator) as in the central model of differe
Externí odkaz:
http://arxiv.org/abs/2406.18940
Autor:
Khattak, Muhammad Uzair, Naeem, Muhammad Ferjad, Hassan, Jameel, Naseer, Muzammal, Tombari, Federico, Khan, Fahad Shahbaz, Khan, Salman
Recent advancements in Large Language Models (LLMs) have led to the development of Video Large Multi-modal Models (Video-LMMs) that can handle a wide range of video understanding tasks. These models have the potential to be deployed in real-world app
Externí odkaz:
http://arxiv.org/abs/2405.03690
Autor:
Hassan, Jameel, Gani, Hanan, Hussein, Noor, Khattak, Muhammad Uzair, Naseer, Muzammal, Khan, Fahad Shahbaz, Khan, Salman
The promising zero-shot generalization of vision-language models such as CLIP has led to their adoption using prompt learning for numerous downstream tasks. Previous works have shown test-time prompt tuning using entropy minimization to adapt text pr
Externí odkaz:
http://arxiv.org/abs/2311.01459
Two parties wish to collaborate on their datasets. However, before they reveal their datasets to each other, the parties want to have the guarantee that the collaboration would be fruitful. We look at this problem from the point of view of machine le
Externí odkaz:
http://arxiv.org/abs/2310.02563
Biometric authentication service providers often claim that it is not possible to reverse-engineer a user's raw biometric sample, such as a fingerprint or a face image, from its mathematical (feature-space) representation. In this paper, we investiga
Externí odkaz:
http://arxiv.org/abs/2304.05561
One of the new developments in chit-chat bots is a long-term memory mechanism that remembers information from past conversations for increasing engagement and consistency of responses. The bot is designed to extract knowledge of personal nature from
Externí odkaz:
http://arxiv.org/abs/2304.05371
Intra-class variations in the open world lead to various challenges in classification tasks. To overcome these challenges, fine-grained classification was introduced, and many approaches were proposed. Some rely on locating and using distinguishable
Externí odkaz:
http://arxiv.org/abs/2302.04800
Autor:
Asghar, Hassan Jameel, Zhao, Benjamin Zi Hao, Ikram, Muhammad, Nguyen, Giang, Kaafar, Dali, Lamont, Sean, Coscia, Daniel
Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection. Use of cryptography may give the impression that these obfuscation techniques have some provable guar
Externí odkaz:
http://arxiv.org/abs/2212.04008