Sahar Abdelnabi

Orcid: 0009-0000-5269-951X

According to our database1, Sahar Abdelnabi authored at least 21 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hypothesizing Missing Causal Variables with LLMs.
CoRR, 2024

Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition.
CoRR, 2024

Are you still on track!? Catching LLM Task Drift with Activations.
CoRR, 2024

Can LLMs Separate Instructions From Data? And What Do We Even Mean By That?
CoRR, 2024

Exploring Value Biases: How LLMs Deviate Towards the Ideal.
CoRR, 2024

Tell Me What You Like and I Know What You Will Share: Topical Interest Influences Behavior Toward News From High and Low Credible Sources.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
LLM-Deliberation: Evaluating LLMs with Interactive Multi-Agent Negotiation Games.
CoRR, 2023

A Large-Scale Study of Phishing PDF Documents.
CoRR, 2023

From Bad to Worse: Using Private Data to Propagate Disinformation on Online Platforms with a Greater Efficiency.
CoRR, 2023

More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models.
CoRR, 2023

Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Not What You've Signed Up For: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Open-Domain, Content-based, Multi-modal Fact-checking of Out-of-Context Images via Online Resources.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

What's in the box: Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021

2020
Black-Box Watermarking for Generative Adversarial Networks.
CoRR, 2020

VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
WhiteNet: Phishing Website Detection by Visual Whitelists.
CoRR, 2019

Towards High-Frequency SSVEP-Based Target Discrimination with an Extended Alphanumeric Keyboard.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019


  Loading...