Ameer Mohammed

Orcid: 0000-0002-2699-3608

According to our database1, Ameer Mohammed authored at least 19 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Vulnerability of Deep Forest to Adversarial Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

A fully integrated charge pump with double-loop control and differentiator-based transient enhancer for neural stimulation applications.
Microelectron. J., 2024

Enhancing adversarial robustness with randomized interlayer processing.
Expert Syst. Appl., 2024

2022
Evaluating Adversarial Robustness of Secret Key-Based Defenses.
IEEE Access, 2022

2020
Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data.
IEEE Internet Things J., 2020

Incremental Deployment of Hybrid IP/SDN Network with Optimized Traffic Engineering.
Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2020

2019
Data Poisoning Attacks in Multi-Party Learning.
Proceedings of the 36th International Conference on Machine Learning, 2019

2018
Multi-party Poisoning through Generalized p-Tampering.
IACR Cryptol. ePrint Arch., 2018

Limits on the Power of Garbling Techniques for Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2018

Complementary Detection for Hardware Efficient On-Site Monitoring of Parkinsonian Progress.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2018

2017
When does Functional Encryption Imply Obfuscation?
IACR Cryptol. ePrint Arch., 2017

Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives.
IACR Cryptol. ePrint Arch., 2017

2016
A Note on Black-Box Complexity of Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2016

On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

2015
Lower Bounds on Assumptions behind Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2015

More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models.
IACR Cryptol. ePrint Arch., 2015

On the Power of Hierarchical Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2015

Output stage of a dynamic current steering deep brain stimulator.
Proceedings of the 2015 IEEE International Conference on Electronics, 2015

Patient specific Parkinson's disease detection for adaptive deep brain stimulation.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015


  Loading...