default search action
Mahmood Sharif
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Nadav Gat, Mahmood Sharif:
Harmful Bias: A General Label-Leakage Attack on Federated Learning from Bias Gradients. AISec@CCS 2024: 31-41 - [c21]Zebin Yun, Achi-Or Weingarten, Eyal Ronen, Mahmood Sharif:
The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations. AISec@CCS 2024: 113-124 - [c20]Keane Lucas, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Training Robust ML-based Raw-Binary Malware Detectors in Hours, not Months. CCS 2024: 124-138 - [c19]Zahra Rahmani, Nahal Shahini, Nadav Gat, Zebin Yun, Yuzhou Jiang, Ofir Farchy, Yaniv Harel, Vipin Chaudhary, Erman Ayday, Mahmood Sharif:
Privacy-Preserving Collaborative Genomic Research: A Real-Life Deployment and Vision. HealthSec@CCS 2024: 85-91 - [c18]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. NDSS 2024 - [c17]Matan Ben-Tov, Daniel Deutch, Nave Frost, Mahmood Sharif:
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers. SP 2024: 1345-1364 - [c16]Mahmood Sharif, Pubali Datta, Andy Riddle, Kim Westfall, Adam Bates, Vijay Ganti, Matthew Lentz, David Ott:
DrSec: Flexible Distributed Representations for Efficient Endpoint Security. SP 2024: 3609-3624 - [c15]Yukiko Sawaya, Sarah Lu, Takamasa Isohara, Mahmood Sharif:
A High Coverage Cybersecurity Scale Predictive of User Behavior. USENIX Security Symposium 2024 - [i10]Tsufit Shua, Mahmood Sharif:
Adversarial Robustness Through Artifact Design. CoRR abs/2402.04660 (2024) - [i9]Zahra Rahmani, Nahal Shahini, Nadav Gat, Zebin Yun, Yuzhou Jiang, Ofir Farchy, Yaniv Harel, Vipin Chaudhary, Mahmood Sharif, Erman Ayday:
Privacy-Preserving Collaborative Genomic Research: A Real-Life Deployment and Vision. CoRR abs/2407.09004 (2024) - 2023
- [c14]Amit Cohen, Mahmood Sharif:
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition. ESORICS (3) 2023: 43-61 - [c13]Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Adversarial Training for Raw-Binary Malware Classifiers. USENIX Security Symposium 2023: 1163-1180 - [i8]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. CoRR abs/2306.16614 (2023) - [i7]Zebin Yun, Achi-Or Weingarten, Eyal Ronen, Mahmood Sharif:
The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations. CoRR abs/2312.11309 (2023) - 2022
- [j4]Haoze Wu, Clark W. Barrett, Mahmood Sharif, Nina Narodytska, Gagandeep Singh:
Scalable verification of GNN-based job schedulers. Proc. ACM Program. Lang. 6(OOPSLA2): 1036-1065 (2022) - [c12]Daniel Kats, Mahmood Sharif:
"I Have No Idea What a Social Bot Is": On Users' Perceptions of Social Bots and Ability to Detect Them. HAI 2022: 32-40 - [c11]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. ICML 2022: 13405-13430 - [d1]Haoze Wu, Clark W. Barrett, Mahmood Sharif, Nina Narodytska, Gagandeep Singh:
Artifact for Paper Scalable Verification of GNN-Based Job Schedulers. Zenodo, 2022 - [i6]Haoze Wu, Clark W. Barrett, Mahmood Sharif, Nina Narodytska, Gagandeep Singh:
Scalable Verification of GNN-based Job Schedulers. CoRR abs/2203.03153 (2022) - 2021
- [c10]Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre:
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. AsiaCCS 2021: 744-758 - [i5]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. CoRR abs/2112.14232 (2021) - 2020
- [c9]Camille Cobb, Milijana Surbatovich, Anna Kawakami, Mahmood Sharif, Lujo Bauer, Anupam Das, Limin Jia:
How Risky Are Real Users' IFTTT Applets? SOUPS @ USENIX Security Symposium 2020: 505-529
2010 – 2019
- 2019
- [j3]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
A General Framework for Adversarial Examples with Objectives. ACM Trans. Priv. Secur. 22(3): 16:1-16:30 (2019) - [c8]Mahmood Sharif, Kevin A. Roundy, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Lujo Bauer, Nicolas Christin:
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats. CHI 2019: 78 - [i4]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers. CoRR abs/1912.09059 (2019) - [i3]Mahmood Sharif, Keane Lucas, Lujo Bauer, Michael K. Reiter, Saurabh Shintre:
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection. CoRR abs/1912.09064 (2019) - 2018
- [c7]Mahmood Sharif, Jumpei Urakawa, Nicolas Christin, Ayumu Kubota, Akira Yamada:
Predicting Impending Exposure to Malicious Content from User Behavior. CCS 2018: 1487-1501 - [c6]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples. CVPR Workshops 2018: 1605-1613 - [c5]William Melicher, Anupam Das, Mahmood Sharif, Lujo Bauer, Limin Jia:
Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting. NDSS 2018 - [c4]Joshua Tan, Mahmood Sharif, Sruti Bhagavatula, Matthias Beckerle, Michelle L. Mazurek, Lujo Bauer:
Comparing Hypothetical and Realistic Privacy Valuations. WPES@CCS 2018: 168-182 - [i2]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition. CoRR abs/1801.00349 (2018) - [i1]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-norms for Creating and Preventing Adversarial Examples. CoRR abs/1802.09653 (2018) - 2017
- [j2]Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin:
Topics of Controversy: An Empirical Analysis of Web Censorship Lists. Proc. Priv. Enhancing Technol. 2017(1): 42-61 (2017) - [c3]Yukiko Sawaya, Mahmood Sharif, Nicolas Christin, Ayumu Kubota, Akihiro Nakarai, Akira Yamada:
Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior. CHI 2017: 2202-2214 - 2016
- [j1]William Melicher, Mahmood Sharif, Joshua Tan, Lujo Bauer, Mihai Christodorescu, Pedro Giovanni Leon:
(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking. Proc. Priv. Enhancing Technol. 2016(2): 135-154 (2016) - [c2]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. CCS 2016: 1528-1540 - 2013
- [c1]Orr Dunkelman, Margarita Osadchy, Mahmood Sharif:
Secure authentication from facial attributeswith no privacy loss. CCS 2013: 1403-1406
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint