Mahmood Sharif

Orcid: 0000-0001-7661-2220

According to our database1, Mahmood Sharif authored at least 25 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adversarial Robustness Through Artifact Design.
CoRR, 2024

2023
The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations.
CoRR, 2023

Group-based Robustness: A General Framework for Customized Robustness in the Real World.
CoRR, 2023

Adversarial Training for Raw-Binary Malware Classifiers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Scalable verification of GNN-based job schedulers.
Proc. ACM Program. Lang., 2022

Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks.
Proceedings of the International Conference on Machine Learning, 2022

"I Have No Idea What a Social Bot Is": On Users' Perceptions of Social Bots and Ability to Detect Them.
Proceedings of the International Conference on Human-Agent Interaction, 2022

2021
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
How Risky Are Real Users' IFTTT Applets?
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

2019
A General Framework for Adversarial Examples with Objectives.
ACM Trans. Priv. Secur., 2019

Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection.
CoRR, 2019

n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers.
CoRR, 2019

A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
On the Suitability of L<sub>p</sub>-norms for Creating and Preventing Adversarial Examples.
CoRR, 2018

Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition.
CoRR, 2018

Comparing Hypothetical and Realistic Privacy Valuations.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

Predicting Impending Exposure to Malicious Content from User Behavior.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Topics of Controversy: An Empirical Analysis of Web Censorship Lists.
Proc. Priv. Enhancing Technol., 2017

Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking.
Proc. Priv. Enhancing Technol., 2016

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2013
Secure authentication from facial attributeswith no privacy loss.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013


  Loading...