Skip to main content

Showing 1–9 of 9 results for author: Verma, R M

.
  1. arXiv:2406.17967  [pdf, other

    cs.CL

    Unmasking the Imposters: In-Domain Detection of Human vs. Machine-Generated Tweets

    Authors: Bryan E. Tuck, Rakesh M. Verma

    Abstract: The rapid development of large language models (LLMs) has significantly improved the generation of fluent and convincing text, raising concerns about their misuse on social media platforms. We present a methodology using Twitter datasets to examine the generative capabilities of four LLMs: Llama 3, Mistral, Qwen2, and GPT4o. We evaluate 7B and 8B parameter base-instruction models of the three open… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2405.03920  [pdf, other

    cs.CL cs.AI cs.MM

    A Roadmap for Multilingual, Multimodal Domain Independent Deception Detection

    Authors: Dainis Boumber, Rakesh M. Verma, Fatima Zahra Qachfar

    Abstract: Deception, a prevalent aspect of human communication, has undergone a significant transformation in the digital age. With the globalization of online interactions, individuals are communicating in multiple languages and mixing languages on social media, with varied data becoming available in each language and dialect. At the same time, the techniques for detecting deception are similar across the… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: 6 pages, 1 figure, shorter version in SIAM International Conference on Data Mining (SDM) 2024

    ACM Class: I.2.6; I.2.7; I.2.10; K.4.4

    Journal ref: Proc. SDM 2024, 396-399

  3. arXiv:2402.03171  [pdf, other

    cs.CL cs.CR cs.LG

    Homograph Attacks on Maghreb Sentiment Analyzers

    Authors: Fatima Zahra Qachfar, Rakesh M. Verma

    Abstract: We examine the impact of homograph attacks on the Sentiment Analysis (SA) task of different Arabic dialects from the Maghreb North-African countries. Homograph attacks result in a 65.3% decrease in transformer classification from an F1-score of 0.95 to 0.33 when data is written in "Arabizi". The goal of this study is to highlight LLMs weaknesses' and to prioritize ethical and responsible Machine L… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: NAML, North Africans in Machine Leaning, NeurIPS, Neural Information Processing Systems

  4. arXiv:2402.01019  [pdf, other

    cs.CL cs.CR cs.CY

    Domain-Independent Deception: A New Taxonomy and Linguistic Analysis

    Authors: Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Dainis Boumber, Xuting Liu

    Abstract: Internet-based economies and societies are drowning in deceptive attacks. These attacks take many forms, such as fake news, phishing, and job scams, which we call ``domains of deception.'' Machine-learning and natural-language-processing researchers have been attempting to ameliorate this precarious situation by designing domain-specific detectors. Only a few recent works have considered domain-in… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

    Comments: 33 pages. arXiv admin note: text overlap with arXiv:2207.01738

  5. arXiv:2207.01738  [pdf, other

    cs.CR cs.CY

    Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate

    Authors: Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu

    Abstract: Internet-based economies and societies are drowning in deceptive attacks. These attacks take many forms, such as fake news, phishing, and job scams, which we call "domains of deception." Machine-learning and natural-language-processing researchers have been attempting to ameliorate this precarious situation by designing domain-specific detectors. Only a few recent works have considered domain-inde… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

    Comments: 16 pages, 2 figures

    ACM Class: K.6.5

  6. arXiv:2103.08001  [pdf, other

    cs.LG cs.AI cs.CL

    Claim Verification using a Multi-GAN based Model

    Authors: Amartya Hatua, Arjun Mukherjee, Rakesh M. Verma

    Abstract: This article describes research on claim verification carried out using a multiple GAN-based model. The proposed model consists of three pairs of generators and discriminators. The generator and discriminator pairs are responsible for generating synthetic data for supported and refuted claims and claim labels. A theoretical discussion about the proposed model is provided to validate the equilibriu… ▽ More

    Submitted 20 July, 2021; v1 submitted 14 March, 2021; originally announced March 2021.

    Comments: Paper is submitted at LDK 2021 3rd Conference on Language, Data and Knowledge

    MSC Class: 68T50

  7. arXiv:2007.07403  [pdf, other

    cs.CL

    Modeling Coherency in Generated Emails by Leveraging Deep Neural Learners

    Authors: Avisha Das, Rakesh M. Verma

    Abstract: Advanced machine learning and natural language techniques enable attackers to launch sophisticated and targeted social engineering-based attacks. To counter the active attacker issue, researchers have since resorted to proactive methods of detection. Email masquerading using targeted emails to fool the victim is an advanced attack method. However automatic text generation requires controlling the… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

    Comments: Accepted for Publication at ComputaciĆ³n y Sistemas (CyS); Poster at CiCLing 2019 and WiML@ICML 2020

  8. arXiv:2006.13499  [pdf, other

    cs.CR cs.HC cs.SI

    Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack

    Authors: Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali

    Abstract: Cyber attacks such as phishing, IRS scams, etc., still are successful in fooling Internet users. Users are the last line of defense against these attacks since attackers seem to always find a way to bypass security systems. Understanding users' reason about the scams and frauds can help security providers to improve users security hygiene practices. In this work, we study the users' reasoning and… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: 15 pages, 6 figures

    ACM Class: H.5.m; I.2.7; J.4

  9. arXiv:cs/0010034  [pdf, ps, other

    cs.LO cs.PL

    Static Analysis Techniques for Equational Logic Programming

    Authors: Rakesh M. Verma

    Abstract: An equational logic program is a set of directed equations or rules, which are used to compute in the obvious way (by replacing equals with ``simpler'' equals). We present static analysis techniques for efficient equational logic programming, some of which have been implemented in $LR^2$, a laboratory for develo** and evaluating fast, efficient, and practical rewriting techniques. Two novel fe… ▽ More

    Submitted 27 October, 2000; originally announced October 2000.

    Comments: Appeared in 1st ACM SIGPLAN Workshop on Rule-based Programming (RULE 2000)

    ACM Class: F.3.2; D.3.2