Obserwuj
Mahmood Sharif
Tytuł
Cytowane przez
Cytowane przez
Rok
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
11962016
A General Framework for Adversarial Examples with Objectives
M Sharif, S Bhagavatula, L Bauer, MK Reiter
ACM Transactions on Privacy and Security (TOPS) 22 (3), 16:1--16:30, 2019
173*2019
On the suitability of Lp-norms for creating and preventing adversarial examples
M Sharif, L Bauer, MK Reiter
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
962018
Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior
Y Sawaya, M Sharif, N Christin, A Kubota, A Nakarai, A Yamada
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
782017
(Do Not) Track Me Sometimes: Users’ Contextual Preferences for Web Tracking
W Melicher, M Sharif, J Tan, L Bauer, M Christodorescu, PG Leon
Proceedings on Privacy Enhancing Technologies 2016 (2), 135-154, 2016
642016
Riding out DOMsday: Toward Detecting and Preventing DOM Cross-Site Scripting
W Melicher, A Das, M Sharif, L Bauer, L Jia
ISOC NDSS, 2018
512018
Predicting Impending Exposure to Malicious Content from User Behavior
M Sharif, J Urakawa, N Christin, A Kubota, A Yamada
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
392018
Topics of Controversy: An Empirical Analysis of Web Censorship Lists
Z Weinberg, M Sharif, J Szurdi, N Christin
Proceedings on Privacy Enhancing Technologies 2017 (1), 42-61, 2017
192017
How Risky Are Real Users’ IFTTT Applets?
C Cobb, M Surbatovich, A Kawakami, M Sharif, L Bauer, A Das, L Jia
USENIX Symposium on Usable Privacy and Security (SOUPS), 2020
122020
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
M Sharif, K Lucas, L Bauer, MK Reiter, S Shintre
arXiv preprint arXiv:1912.09064, 2019
112019
Comparing Hypothetical and Realistic Privacy Valuations
J Tan, M Sharif, S Bhagavatula, M Beckerle, ML Mazurek, L Bauer
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 168-182, 2018
92018
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
K Lucas, M Sharif, L Bauer, MK Reiter, S Shintre
Asia Conference on Computer and Communications Security (AsiaCCS), 2021
72021
Systems and methods for real-time scam protection on phones
K Roundy, M Sharif, A Tamersoy
US Patent 10,455,085, 2019
62019
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats
M Sharif, KA Roundy, M Dell'Amico, C Gates, D Kats, L Bauer, N Christin
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 78, 2019
62019
POSTER: Secure authentication from facial attributeswith no privacy loss
O Dunkelman, M Osadchy, M Sharif
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
42013
-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers
M Sharif, L Bauer, MK Reiter
arXiv preprint arXiv:1912.09059, 2019
32019
Scalable Verification of GNN-based Job Schedulers
H Wu, C Barrett, M Sharif, N Narodytska, G Singh
arXiv preprint arXiv:2203.03153, 2022
2022
Systems and methods for training malware classifiers
M Sharif, S Shintre, K Roundy, S Bhatkar
US Patent 11,210,397, 2021
2021
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks
W Lin, K Lucas, L Bauer, MK Reiter, M Sharif
arXiv preprint arXiv:2112.14232, 2021
2021
Discovery of computer system incidents to be remediated based on correlation between support interaction data and computer system telemetry data
KA Roundy, M Sharif, M Dell'Amico, C Gates, D Kats, D Chung
US Patent 11,163,875, 2021
2021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20