Ilia Shumailov
Cited by
Cited by
Making Bitcoin Legal
R Anderson, I Shumailov, M Ahmed
International Workshop on Security Protocols (SPW 2018), 2018
Hearing your touch: A new acoustic side channel on smartphones
I Shumailov, L Simon, J Yan, R Anderson
arXiv preprint arXiv:1903.11137, 2019
To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression
Y Zhao, I Shumailov, R Mullins, R Anderson
Conference on Machine Learning and Systems (SysML 2018), 2018
Bitcoin Redux
R Anderson, I Shumailov, M Ahmed, A Rietmann
Workshop on the Economics of Information Security (WEIS 2018), 2018
Sponge examples: Energy-latency attacks on neural networks
I Shumailov, Y Zhao, D Bates, N Papernot, R Mullins, R Anderson
6th IEEE European Symposium on Security and Privacy (EuroS&P 2021), 2020
Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains
R Bhalerao, M Aliapoulios, I Shumailov, S Afroz, D McCoy
Symposium on Electronic Crime Research (eCrime 2019), 2019
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Y Zhao, I Shumailov, H Cui, X Gao, R Mullins, R Anderson
DSML 2020 Dependable and Secure Machine Learning, 2019
Towards certifiable adversarial sample detection
I Shumailov, Y Zhao, R Mullins, R Anderson
13th ACM Workshop on Artificial Intelligence and Security (AISec 2020), 13-24, 2020
Turning up the dial: the evolution of a cybercrime market through set-up, stable, and covid-19 eras
AV Vu, J Hughes, I Pete, B Collier, YT Chua, I Shumailov, A Hutchings
ACM Internet Measurement Conference (IMC), 551-566, 2020
The taboo trap: Behavioural detection of adversarial samples
I Shumailov, Y Zhao, R Mullins, R Anderson
arXiv preprint arXiv:1811.07375, 2018
Sitatapatra: Blocking the transfer of adversarial samples
I Shumailov, X Gao, Y Zhao, R Mullins, R Anderson, CZ Xu
arXiv preprint arXiv:1901.08121, 2019
Comparing relational and graph databases for pedigree data sets
G Kirby, C de Kerckhove, I Shumailov, J Carson, A Dearle, C Dibben, ...
URl: http://socialhistory. org/sites/default/files/docs/kirby_et_al …, 2014
Not my deepfake: Towards plausible deniability for machine-generated media
B Zhang, JP Zhou, I Shumailov, N Papernot
arXiv e-prints, arXiv: 2008.09194, 2020
Tendrils of Crime Visualizing the Diffusion of Stolen Bitcoins
M Ahmed, I Shumailov, R Anderson
The Fifth International Workshop on Graphical Models for Security (GramSec), 2018
Computational analysis of valence and arousal in virtual reality gaming using lower arm electromyograms
I Shumailov, H Gunes
2017 Seventh International Conference on Affective Computing and Intelligent …, 2017
Manipulating SGD with data ordering attacks
I Shumailov, Z Shumaylov, D Kazhdan, Y Zhao, N Papernot, MA Erdogdu, ...
arXiv preprint arXiv:2104.09667, 2021
Nudge attacks on point-cloud dnns
Y Zhao, I Shumailov, R Mullins, R Anderson
arXiv preprint arXiv:2011.11637, 2020
BatNet: Data transmission between smartphones over ultrasound
A Zarandy, I Shumailov, R Anderson
arXiv preprint arXiv:2008.00136, 2020
Bad Characters: Imperceptible NLP Attacks
N Boucher, I Shumailov, N Papernot, R Anderson, 2021
Markpainting: Adversarial Machine Learning meets Inpainting
D Khachaturov, I Shumailov, Y Zhao, N Papernot, R Anderson
38th International Conference on Machine Learning (ICML), 2021
The system can't perform the operation now. Try again later.
Articles 1–20