Home
Publications
Teaching
Contact
Publications
Type
Conference paper
Journal article
Thesis
Date
2024
2022
2021
2020
2019
2018
2017
2016
2013
Vulnerability of Deep Forest to Adversarial Attacks
Ziad Tariq Ali
,
Ameer Mohammed
,
Imtiaz Ahmad
IEEE Transactions on Information Forensics and Security, 2024
Enhancing adversarial robustness with randomized interlayer processing
Ameer Mohammed
,
Ziad Tariq Ali
,
Imtiaz Ahmad
Expert Systems with Applications, 2024
Evaluating Adversarial Robustness of Secret Key-Based Defenses
Ziad Tariq Ali
,
Ameer Mohammed
,
Imtiaz Ahmad
IEEE Access, 2022
Deep forest model for diagnosing COVID-19 from routine blood tests
Maryam AlJame
,
Ayyub Imtiaz
,
Imtiaz Ahmad
,
Ameer Mohammed
International Journal on Artifical Intelligence Tools, 2021
Incremental Deployment of Hybrid IP/SDN Network with Optimized Traffic Engineering
Ali Kelkawi
,
Ameer Mohammed
,
Anwar Alyatama
IEEE Conference on Network Function Virtualization and Software Defined Networks, 2020
Ensemble learning model for diagnosing COVID-19 from routine blood tests
Maryam AlJame
,
Imtiaz Ahmad
,
Ayyub Imtiaz
,
Ameer Mohammed
Informatics in Medicine Unlocked, 2020
Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data
Tassos Dimitriou
,
Ameer Mohammed
IEEE Internet of Things Journal, 2020
Universal Multi-party Poisoning Attacks
Saeed Mahloujifar
,
Mohammad Mahmoody
,
Ameer Mohammed
International Conference on Machine Learning, 2019
PDF
Cite
The Computational Complexity of Program Obfuscation
Ameer Mohammed
Computer Science Department, University of Virginia, 2018
PDF
Cite
When does Functional Encryption Imply Obfuscation?
Sanjam Garg
,
Mohammad Mahmoody
,
Ameer Mohammed
Theory of Cryptography Conference, 2017
PDF
Cite
Lower Bounds on Indistinguishability Obfuscation from All-or-Nothing Encryption Primitives
Sanjam Garg
,
Mohammad Mahmoody
,
Ameer Mohammed
CRYPTO, 2017
PDF
Cite
On the Power of Hierarchical Identity-based Encryption
Mohammad Mahmoody
,
Ameer Mohammed
EUROCRYPT, 2016
PDF
Cite
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation
Mohammad Mahmoody
,
Ameer Mohammed
,
Soheil Nematihaji
,
Rafael Pass
,
abhi shelat
Theory of Cryptography Conference, 2016
PDF
Cite
Slides
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Mohammad Mahmoody
,
Ameer Mohammed
,
Soheil Nematihaji
Theory of Cryptography Conference, 2016
PDF
Cite
Cryptographic Applications of Learning with Errors
Ameer Mohammed
Carnegie Mellon University, 2013
PDF
Cite
Cite
×