Mahmood Sharif
Orcid: 0000-0001-7661-2220
According to our database1,
Mahmood Sharif
authored at least 30 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Privacy-Preserving Collaborative Genomic Research: A Real-Life Deployment and Vision.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Group-based Robustness: A General Framework for Customized Robustness in the Real World.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
Dataset, September, 2022
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks.
Proceedings of the International Conference on Machine Learning, 2022
"I Have No Idea What a Social Bot Is": On Users' Perceptions of Social Bots and Ability to Detect Them.
Proceedings of the International Conference on Human-Agent Interaction, 2022
2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
2019
ACM Trans. Priv. Secur., 2019
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection.
CoRR, 2019
n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers.
CoRR, 2019
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
On the Suitability of L<sub>p</sub>-norms for Creating and Preventing Adversarial Examples.
CoRR, 2018
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition.
CoRR, 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013