On the robustness of vision transformers to adversarial examples K Mahmood, R Mahmood, M Van Dijk Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021 | 239 | 2021 |
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks PH Nguyen, DP Sahoo, C Jin, K Mahmood, U Rührmair, M van Dijk IACR Transactions on Cryptographic Hardware and Embedded Systems, 243-290, 2019 | 191 | 2019 |
On-demand asynchronous localization for underwater sensor networks P Carroll, K Mahmood, S Zhou, H Zhou, X Xu, JH Cui IEEE transactions on signal processing 62 (13), 3337-3348, 2014 | 131 | 2014 |
Real-time automated counterfeit integrated circuit detection using x-ray microscopy K Mahmood, PL Carmona, S Shahbazmohamadi, F Pla, B Javidi Applied Optics 54 (13), D25-D32, 2015 | 55 | 2015 |
Autorep: Automatic relu replacement for fast private network inference H Peng, S Huang, T Zhou, Y Luo, C Wang, Z Wang, J Zhao, X Xie, A Li, ... Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 28 | 2023 |
Moving target defense for Internet of Things using context aware code partitioning and code diversification K Mahmood, DM Shila 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 329-330, 2016 | 26 | 2016 |
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks K Mahmood, R Mahmood, E Rathbun, M van Dijk IEEE Access 10, 998-1019, 2021 | 23 | 2021 |
Beware the Black-Box: On the Robustness of Recent Defenses to Adversarial Examples K Mahmood, D Gurevin, M van Dijk, PH Nguyen Entropy 23 (10), 1359, 2021 | 20 | 2021 |
Besting the Black-Box: Barrier Zones for Adversarial Example Defense K Mahmood, PH Nguyen, LM Nguyen, T Nguyen, M Van Dijk IEEE Access 10, 1451-1474, 2021 | 18* | 2021 |
Securing the Spike: On the Transferability and Security of Spiking Neural Networks to Adversarial Examples N Xu, K Mahmood, H Fang, E Rathbun, C Ding, W Wen arXiv e-prints, arXiv: 2209.03358, 2022 | 10 | 2022 |
MXPUF: Secure PUF design against state-of-the-art modeling attacks PH Nguyen, DP Sahoo, C Jin, K Mahmood, M van Dijk Cryptology ePrint Archive, 2017 | 9 | 2017 |
AQ2PNN: Enabling Two-party Privacy-Preserving Deep Neural Network Inference with Adaptive Quantization Y Luo, N Xu, H Peng, C Wang, S Duan, K Mahmood, W Wen, C Ding, ... Proceedings of the 56th Annual IEEE/ACM International Symposium on …, 2023 | 8 | 2023 |
Analyzing and Defending against Membership Inference Attacks in Natural Language Processing Classification Y Wang, N Xu, S Huang, K Mahmood, D Guo, C Ding, W Wen, ... 2022 IEEE International Conference on Big Data (Big Data), 5823-5832, 2022 | 8 | 2022 |
Implementation and field testing of on-demand asynchronous underwater localization K Mahmood, K Domrese, P Carroll, H Zhou, X Xu, S Zhou Proc. of Asilomar Conf. on Signals, Systems, and Computers, 2013 | 7 | 2013 |
Study of class-D power amplifiers for underwater acoustic OFDM transmissions X Xu, S Zhou, K Mahmood, L Wei, JH Cui 2013 OCEANS-San Diego, 1-3, 2013 | 7 | 2013 |
Neurogenesis dynamics-inspired spiking neural network training acceleration S Huang, H Fang, K Mahmood, B Lei, N Xu, B Lei, Y Sun, D Xu, W Wen, ... 2023 60th ACM/IEEE Design Automation Conference (DAC), 1-6, 2023 | 6 | 2023 |
Inverting Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models S Ahmad, K Mahmood, B Fuller 2022 IEEE International Joint Conference on Biometrics (IJCB), 1-11, 2022 | 6 | 2022 |
Game Theoretic Mixed Experts for Combinational Adversarial Machine Learning E Rathbun, K Mahmood, S Ahmad, C Ding, M van Dijk arXiv preprint arXiv:2211.14669, 2022 | 2 | 2022 |
Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness J Deng, H Hong, A Palmer, X Zhou, J Bi, K Mahmood, Y Hong, D Aguiar arXiv preprint arXiv:2405.16036, 2024 | | 2024 |
Distilling Adversarial Robustness Using Heterogeneous Teachers J Deng, A Palmer, R Mahmood, E Rathbun, J Bi, K Mahmood, D Aguiar arXiv preprint arXiv:2402.15586, 2024 | | 2024 |