Follow
Ambar Pal
Title
Cited by
Cited by
Year
An empirical evaluation of visual question answering for novel objects
SK Ramakrishnan, A Pal, G Sharma, A Mittal
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2017
312017
A game theoretic analysis of additive adversarial attacks and defenses
A Pal, R Vidal
Advances in Neural Information Processing Systems 33, 1345-1355, 2020
292020
On the regularization properties of structured dropout
A Pal, C Lane, R Vidal, BD Haeffele
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
142020
Understanding noise-augmented training for randomized smoothing
A Pal, J Sulam
arXiv preprint arXiv:2305.04746, 2023
62023
Identifying physically realizable triggers for backdoored face recognition networks
A Raj, A Pal, C Arora
2021 IEEE International Conference on Image Processing (ICIP), 3023-3027, 2021
52021
The internet of things: Perspectives on security from RFID and WSN
A Shah, A Pal, HB Acharya
arXiv preprint arXiv:1604.00389, 2016
52016
Adversarial examples might be avoidable: The role of data concentration in adversarial robustness
A Pal, J Sulam, R Vidal
Advances in Neural Information Processing Systems 36, 2024
22024
Cells in the Internet of Things
A Shah, HB Acharya, A Pal
arXiv preprint arXiv:1510.07861, 2015
22015
On Utilizing Relationships for Transferable Few-Shot Fine-Grained Object Detection
A Pal, A Ramisa, R Vidal
arXiv preprint arXiv:2212.00770, 2022
2022
Making Deep Neural Network Fooling Practical
A Pal, C Arora
2018 25th IEEE International Conference on Image Processing (ICIP), 3428-3432, 2018
2018
Publications and reports
F Monitor, PSE Forecasts
2018
Exploiting independent visual and textual data sources to improve multi-modal methods for description and querying of visual data
A Pal, G Sharma, C Arora
IIIT-Delhi, 2016
2016
Rules in Play: On the Complexity of Routing Tables and Firewalls
M Wadhwa, A Pal, A Shah, P Mittal, HB Acharya
arXiv preprint arXiv:1510.07880, 2015
2015
Certified Defenses Against Near-Subspace Unrestricted Adversarial Attacks
A Pal, R Vidal
The system can't perform the operation now. Try again later.
Articles 1–14