Seguir
Mahmood Sharif
Título
Citado por
Citado por
Año
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
17772016
A General Framework for Adversarial Examples with Objectives
M Sharif, S Bhagavatula, L Bauer, MK Reiter
ACM Transactions on Privacy and Security (TOPS) 22 (3), 16:1--16:30, 2019
294*2019
On the suitability of Lp-norms for creating and preventing adversarial examples
M Sharif, L Bauer, MK Reiter
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
1612018
Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior
Y Sawaya, M Sharif, N Christin, A Kubota, A Nakarai, A Yamada
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
1282017
(Do Not) Track Me Sometimes: Users’ Contextual Preferences for Web Tracking
W Melicher, M Sharif, J Tan, L Bauer, M Christodorescu, PG Leon
Proceedings on Privacy Enhancing Technologies 2016 (2), 135-154, 2016
872016
Riding out DOMsday: Toward Detecting and Preventing DOM Cross-Site Scripting
W Melicher, A Das, M Sharif, L Bauer, L Jia
ISOC NDSS, 2018
842018
Predicting Impending Exposure to Malicious Content from User Behavior
M Sharif, J Urakawa, N Christin, A Kubota, A Yamada
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
732018
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
K Lucas, M Sharif, L Bauer, MK Reiter, S Shintre
Asia Conference on Computer and Communications Security (AsiaCCS), 2021
582021
How Risky Are Real Users’ IFTTT Applets?
C Cobb, M Surbatovich, A Kawakami, M Sharif, L Bauer, A Das, L Jia
USENIX Symposium on Usable Privacy and Security (SOUPS), 2020
452020
Topics of Controversy: An Empirical Analysis of Web Censorship Lists
Z Weinberg, M Sharif, J Szurdi, N Christin
Proceedings on Privacy Enhancing Technologies 2017 (1), 42-61, 2017
262017
Systems and methods for real-time scam protection on phones
K Roundy, M Sharif, A Tamersoy
US Patent 10,455,085, 2019
152019
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
M Sharif, K Lucas, L Bauer, MK Reiter, S Shintre
arXiv preprint arXiv:1912.09064, 2019
142019
Comparing Hypothetical and Realistic Privacy Valuations
J Tan, M Sharif, S Bhagavatula, M Beckerle, ML Mazurek, L Bauer
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 168-182, 2018
142018
Adversarial Training for Raw-Binary Malware Classifiers
K Lucas, S Pai, W Lin, L Bauer, MK Reiter, M Sharif
The 32nd USENIX Security Symposium, 2023
132023
Scalable Verification of GNN-based Job Schedulers
H Wu, C Barrett, M Sharif, N Narodytska, G Singh
International Conference on Object-Oriented Programming, Systems, Languages …, 2022
102022
-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers
M Sharif, L Bauer, MK Reiter
arXiv preprint arXiv:1912.09059, 2019
72019
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats
M Sharif, KA Roundy, M Dell'Amico, C Gates, D Kats, L Bauer, N Christin
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 78, 2019
62019
Systems and methods for training malware classifiers
M Sharif, S Shintre, K Roundy, S Bhatkar
US Patent 11,210,397, 2021
52021
POSTER: Secure authentication from facial attributeswith no privacy loss
O Dunkelman, M Osadchy, M Sharif
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
42013
Property-Driven Evaluation of RL-Controllers in Self-Driving Datacenters
A Chakravarthy, N Narodytska, A Rathis, M Vilcu, M Sharif, G Singh
Workshop on Challenges in Deploying and monitoring Machine Learning Systems …, 2022
22022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20