Alert button
Picture for Akshayvarun Subramanya

Akshayvarun Subramanya

Alert button

Backdoor Attacks on Vision Transformers

Add code
Bookmark button
Alert button
Jun 16, 2022
Akshayvarun Subramanya, Aniruddha Saha, Soroush Abbasi Koohpayegani, Ajinkya Tejankar, Hamed Pirsiavash

Figure 1 for Backdoor Attacks on Vision Transformers
Figure 2 for Backdoor Attacks on Vision Transformers
Figure 3 for Backdoor Attacks on Vision Transformers
Figure 4 for Backdoor Attacks on Vision Transformers
Viaarxiv icon

A Simple Approach to Adversarial Robustness in Few-shot Image Classification

Add code
Bookmark button
Alert button
Apr 11, 2022
Akshayvarun Subramanya, Hamed Pirsiavash

Figure 1 for A Simple Approach to Adversarial Robustness in Few-shot Image Classification
Figure 2 for A Simple Approach to Adversarial Robustness in Few-shot Image Classification
Figure 3 for A Simple Approach to Adversarial Robustness in Few-shot Image Classification
Figure 4 for A Simple Approach to Adversarial Robustness in Few-shot Image Classification
Viaarxiv icon

Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning

Add code
Bookmark button
Alert button
Dec 08, 2021
Ajinkya Tejankar, Soroush Abbasi Koohpayegani, KL Navaneet, Kossar Pourahmadi, Akshayvarun Subramanya, Hamed Pirsiavash

Figure 1 for Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning
Figure 2 for Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning
Figure 3 for Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning
Figure 4 for Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning
Viaarxiv icon

Adversarial Patches Exploiting Contextual Reasoning in Object Detection

Add code
Bookmark button
Alert button
Sep 30, 2019
Aniruddha Saha, Akshayvarun Subramanya, Koninika Patil, Hamed Pirsiavash

Figure 1 for Adversarial Patches Exploiting Contextual Reasoning in Object Detection
Figure 2 for Adversarial Patches Exploiting Contextual Reasoning in Object Detection
Figure 3 for Adversarial Patches Exploiting Contextual Reasoning in Object Detection
Figure 4 for Adversarial Patches Exploiting Contextual Reasoning in Object Detection
Viaarxiv icon

Hidden Trigger Backdoor Attacks

Add code
Bookmark button
Alert button
Sep 30, 2019
Aniruddha Saha, Akshayvarun Subramanya, Hamed Pirsiavash

Figure 1 for Hidden Trigger Backdoor Attacks
Figure 2 for Hidden Trigger Backdoor Attacks
Figure 3 for Hidden Trigger Backdoor Attacks
Figure 4 for Hidden Trigger Backdoor Attacks
Viaarxiv icon

Towards Hiding Adversarial Examples from Network Interpretation

Add code
Bookmark button
Alert button
Dec 06, 2018
Akshayvarun Subramanya, Vipin Pillai, Hamed Pirsiavash

Figure 1 for Towards Hiding Adversarial Examples from Network Interpretation
Figure 2 for Towards Hiding Adversarial Examples from Network Interpretation
Figure 3 for Towards Hiding Adversarial Examples from Network Interpretation
Figure 4 for Towards Hiding Adversarial Examples from Network Interpretation
Viaarxiv icon

Confidence estimation in Deep Neural networks via density modelling

Add code
Bookmark button
Alert button
Jul 21, 2017
Akshayvarun Subramanya, Suraj Srinivas, R. Venkatesh Babu

Figure 1 for Confidence estimation in Deep Neural networks via density modelling
Figure 2 for Confidence estimation in Deep Neural networks via density modelling
Figure 3 for Confidence estimation in Deep Neural networks via density modelling
Figure 4 for Confidence estimation in Deep Neural networks via density modelling
Viaarxiv icon

Training Sparse Neural Networks

Add code
Bookmark button
Alert button
Nov 21, 2016
Suraj Srinivas, Akshayvarun Subramanya, R. Venkatesh Babu

Figure 1 for Training Sparse Neural Networks
Figure 2 for Training Sparse Neural Networks
Figure 3 for Training Sparse Neural Networks
Figure 4 for Training Sparse Neural Networks
Viaarxiv icon