Mahmood Sharif

Orcid: 0000-0001-7661-2220

According to our database1, Mahmood Sharif authored at least 30 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-Preserving Collaborative Genomic Research: A Real-Life Deployment and Vision.
CoRR, 2024

Adversarial Robustness Through Artifact Design.
CoRR, 2024

A High Coverage Cybersecurity Scale Predictive of User Behavior.
Proceedings of the 33rd USENIX Security Symposium, 2024

DrSec: Flexible Distributed Representations for Efficient Endpoint Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Group-based Robustness: A General Framework for Customized Robustness in the Real World.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations.
CoRR, 2023

Adversarial Training for Raw-Binary Malware Classifiers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Artifact for Paper Scalable Verification of GNN-Based Job Schedulers.
Dataset, September, 2022

Scalable verification of GNN-based job schedulers.
Proc. ACM Program. Lang., 2022

Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks.
Proceedings of the International Conference on Machine Learning, 2022

"I Have No Idea What a Social Bot Is": On Users' Perceptions of Social Bots and Ability to Detect Them.
Proceedings of the International Conference on Human-Agent Interaction, 2022

2021
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
How Risky Are Real Users' IFTTT Applets?
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

2019
A General Framework for Adversarial Examples with Objectives.
ACM Trans. Priv. Secur., 2019

Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection.
CoRR, 2019

n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers.
CoRR, 2019

A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
On the Suitability of L<sub>p</sub>-norms for Creating and Preventing Adversarial Examples.
CoRR, 2018

Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition.
CoRR, 2018

Comparing Hypothetical and Realistic Privacy Valuations.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

Predicting Impending Exposure to Malicious Content from User Behavior.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Topics of Controversy: An Empirical Analysis of Web Censorship Lists.
Proc. Priv. Enhancing Technol., 2017

Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking.
Proc. Priv. Enhancing Technol., 2016

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2013
Secure authentication from facial attributeswith no privacy loss.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013


  Loading...