Follow
Mahmood Sharif
Title
Cited by
Cited by
Year
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
17552016
A General Framework for Adversarial Examples with Objectives
M Sharif, S Bhagavatula, L Bauer, MK Reiter
ACM Transactions on Privacy and Security (TOPS) 22 (3), 16:1--16:30, 2019
288*2019
On the suitability of Lp-norms for creating and preventing adversarial examples
M Sharif, L Bauer, MK Reiter
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
1572018
Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior
Y Sawaya, M Sharif, N Christin, A Kubota, A Nakarai, A Yamada
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
1262017
Riding out DOMsday: Toward Detecting and Preventing DOM Cross-Site Scripting
W Melicher, A Das, M Sharif, L Bauer, L Jia
ISOC NDSS, 2018
842018
(Do Not) Track Me Sometimes: Users’ Contextual Preferences for Web Tracking
W Melicher, M Sharif, J Tan, L Bauer, M Christodorescu, PG Leon
Proceedings on Privacy Enhancing Technologies 2016 (2), 135-154, 2016
842016
Predicting Impending Exposure to Malicious Content from User Behavior
M Sharif, J Urakawa, N Christin, A Kubota, A Yamada
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
722018
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
K Lucas, M Sharif, L Bauer, MK Reiter, S Shintre
Asia Conference on Computer and Communications Security (AsiaCCS), 2021
522021
How Risky Are Real Users’ IFTTT Applets?
C Cobb, M Surbatovich, A Kawakami, M Sharif, L Bauer, A Das, L Jia
USENIX Symposium on Usable Privacy and Security (SOUPS), 2020
432020
Topics of Controversy: An Empirical Analysis of Web Censorship Lists
Z Weinberg, M Sharif, J Szurdi, N Christin
Proceedings on Privacy Enhancing Technologies 2017 (1), 42-61, 2017
262017
Systems and methods for real-time scam protection on phones
K Roundy, M Sharif, A Tamersoy
US Patent 10,455,085, 2019
152019
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
M Sharif, K Lucas, L Bauer, MK Reiter, S Shintre
arXiv preprint arXiv:1912.09064, 2019
142019
Comparing Hypothetical and Realistic Privacy Valuations
J Tan, M Sharif, S Bhagavatula, M Beckerle, ML Mazurek, L Bauer
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 168-182, 2018
142018
Adversarial Training for Raw-Binary Malware Classifiers
K Lucas, S Pai, W Lin, L Bauer, MK Reiter, M Sharif
The 32nd USENIX Security Symposium, 2023
92023
Scalable Verification of GNN-based Job Schedulers
H Wu, C Barrett, M Sharif, N Narodytska, G Singh
International Conference on Object-Oriented Programming, Systems, Languages …, 2022
72022
-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers
M Sharif, L Bauer, MK Reiter
arXiv preprint arXiv:1912.09059, 2019
62019
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats
M Sharif, KA Roundy, M Dell'Amico, C Gates, D Kats, L Bauer, N Christin
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 78, 2019
62019
Systems and methods for training malware classifiers
M Sharif, S Shintre, K Roundy, S Bhatkar
US Patent 11,210,397, 2021
52021
POSTER: Secure authentication from facial attributeswith no privacy loss
O Dunkelman, M Osadchy, M Sharif
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
42013
Property-Driven Evaluation of RL-Controllers in Self-Driving Datacenters
A Chakravarthy, N Narodytska, A Rathis, M Vilcu, M Sharif, G Singh
Workshop on Challenges in Deploying and monitoring Machine Learning Systems …, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20