Paarth Neekhara
Paarth Neekhara
Verified email at - Homepage
Cited by
Cited by
Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
S Hussain, P Neekhara, M Jere, F Koushanfar, J McAuley
arXiv preprint arXiv:2002.12749, 2020
Universal adversarial perturbations for speech recognition systems
P Neekhara, S Hussain, P Pandey, S Dubnov, J McAuley, F Koushanfar
Interspeech 2019, 481-485, 2019
Unsupervised image-to-image translation with generative adversarial networks
H Dong, P Neekhara, C Wu, Y Guo
arXiv preprint arXiv:1701.02676, 2017
Adversarial threats to deepfake detection: A practical perspective
P Neekhara, B Dolhansky, J Bitton, CC Ferrer
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
{WaveGuard}: Understanding and mitigating audio adversarial examples
S Hussain, P Neekhara, S Dubnov, J McAuley, F Koushanfar
30th USENIX security symposium (USENIX Security 21), 2273-2290, 2021
Adversarial Reprogramming of Text Classification Neural Networks
P Neekhara, S Hussain, S Dubnov, F Koushanfar
EMNLP 2019, 5219-5228, 2019
Expressive neural voice cloning
P Neekhara, S Hussain, S Dubnov, F Koushanfar, J McAuley
Asian Conference on Machine Learning, 252-267, 2021
Fastwave: Accelerating autoregressive convolutional neural networks on fpga
S Hussain, M Javaheripi, P Neekhara, R Kastner, F Koushanfar
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2019
Expediting TTS Synthesis with Adversarial Vocoding
P Neekhara, C Donahue, M Puckette, S Dubnov, J McAuley
Interspeech 2019, 2019
Cross-modal adversarial reprogramming
P Neekhara, S Hussain, J Du, S Dubnov, F Koushanfar, J McAuley
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer …, 2022
Exposing vulnerabilities of deepfake detection systems with robust attacks
S Hussain, P Neekhara, B Dolhansky, J Bitton, CC Ferrer, J McAuley, ...
Digital Threats: Research and Practice (DTRAP) 3 (3), 1-23, 2022
FaceSigns: semi-fragile neural watermarks for media authentication and countering deepfakes
P Neekhara, S Hussain, X Zhang, K Huang, J McAuley, F Koushanfar
arXiv preprint arXiv:2204.01960, 2022
Ace-vc: Adaptive and controllable voice conversion using explicitly disentangled self-supervised speech representations
S Hussain, P Neekhara, J Huang, J Li, B Ginsburg
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
Remark-llm: A robust and efficient watermarking framework for generative large language models
R Zhang, SS Hussain, P Neekhara, F Koushanfar
arXiv preprint arXiv:2310.12362, 2023
Adapting TTS models for new speakers using transfer learning
P Neekhara, J Li, B Ginsburg
arXiv preprint arXiv:2110.05798, 2021
FastStamp: Accelerating neural steganography and digital watermarking of images on FPGAs
S Hussain, N Sheybani, P Neekhara, X Zhang, J Duarte, F Koushanfar
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided …, 2022
Reface: Real-time adversarial attacks on face recognition systems
S Hussain, T Huster, C Mesterharm, P Neekhara, K An, M Jere, H Sikka, ...
arXiv preprint arXiv:2206.04783, 2022
Improving Robustness of LLM-based Speech Synthesis by Learning Monotonic Alignment
P Neekhara, S Hussain, S Ghosh, J Li, R Valle, R Badlani, B Ginsburg
arXiv preprint arXiv:2406.17957, 2024
FaceSigns: Semi-Fragile Watermarks for Media Authentication
P Neekhara, S Hussain, X Zhang, K Huang, J McAuley, F Koushanfar
ACM Transactions on Multimedia Computing, Communications and Applications, 2024
SelfVC: Voice Conversion With Iterative Refinement using Self Transformations
P Neekhara, S Hussain, R Valle, B Ginsburg, R Ranjan, S Dubnov, ...
arXiv preprint arXiv:2310.09653, 2023
The system can't perform the operation now. Try again later.
Articles 1–20