Skip to main content

Showing 1–4 of 4 results for author: Aswani, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06278  [pdf, other

    cs.CV cs.CR

    Exploring the Interplay of Interpretability and Robustness in Deep Neural Networks: A Saliency-guided Approach

    Authors: Amira Guesmi, Nishant Suresh Aswani, Muhammad Shafique

    Abstract: Adversarial attacks pose a significant challenge to deploying deep learning models in safety-critical applications. Maintaining model robustness while ensuring interpretability is vital for fostering trust and comprehension in these models. This study investigates the impact of Saliency-guided Training (SGT) on model robustness, a technique aimed at improving the clarity of saliency maps to deepen… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  2. arXiv:2405.03244  [pdf, other

    cs.LG

    Examining Changes in Internal Representations of Continual Learning Models Through Tensor Decomposition

    Authors: Nishant Suresh Aswani, Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique

    Abstract: Continual learning (CL) has spurred the development of several methods aimed at consolidating previous knowledge across sequential learning. Yet, the evaluations of these methods have primarily focused on the final output, such as changes in the accuracy of predicted classes, overlooking the issue of representational forgetting within the model. In this paper, we propose a novel representation-bas… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  3. arXiv:2005.04368  [pdf, other

    cs.CR

    HACK3D: Crowdsourcing the Assessment of Cybersecurity in Digital Manufacturing

    Authors: Michael Linares, Nishant Aswani, Gary Mac, Chenglu **, Fei Chen, Nikhil Gupta, Ramesh Karri

    Abstract: Digital manufacturing (DM) cyber-physical system is vulnerable to both cyber and physical attacks. HACK3D is a series of crowdsourcing red-team-blue-team events hosted by the NYU Center for Cybersecurity to assess the strength of the security methods embedded in designs using DM. This study summarizes the lessons learned from the past three offerings of HACK3D, including ingenious ways in which sk… ▽ More

    Submitted 16 April, 2021; v1 submitted 9 May, 2020; originally announced May 2020.

  4. arXiv:1211.3682  [pdf

    cs.CR

    Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing

    Authors: P. Naga Aswani, K. Chandra Shekar

    Abstract: We exploit edit distance to quantify keywords similarity and develop two advanced techniques on constructing fuzzy keyword sets, which achieve optimized storage and representation overheads. We further propose a brand new symbol-based trie-traverse searching scheme, where a multi-way tree structure is built up using symbols transformed from the resulted fuzzy keyword sets. Through rigorous securit… ▽ More

    Submitted 7 November, 2012; originally announced November 2012.

    Comments: 8 pages, 2012 CSC 2278-9200 published http://www.cschronicle.org