Mohammad Mahmoody
University of Virginia
H-index: 23
North America-United States
Top articles of Mohammad Mahmoody
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Publicly detectable watermarking for language models | arXiv preprint arXiv:2310.18491 | Jaiden Fairoze Sanjam Garg Somesh Jha Saeed Mahloujifar Mohammad Mahmoody | 2023/10/27 |
Fine-grained non-interactive key-exchange: constructions and lower bounds | Abtin Afshar Geoffroy Couteau Mohammad Mahmoody Elahe Sadeghi | 2023/4/16 | |
Black-box separations for non-interactive classical commitments in a quantum world | Kai-Min Chung Yao-Ting Lin Mohammad Mahmoody | 2023/4/16 | |
On the (Im) possibility of Time-Lock Puzzles in the Quantum Random Oracle Model | Abtin Afshar Kai-Min Chung Yao-Ching Hsieh Yao-Ting Lin Mohammad Mahmoody | 2023/12/4 | |
Lower Bounds on Assumptions Behind Registration-Based Encryption | Mohammad Hajiabadi Mohammad Mahmoody Wei Qi Sara Sarfaraz | 2023/11/27 | |
Online Mergers and Applications to Registration-Based Encryption and Accumulators | Mohammad Mahmoody Wei Qi | 2023 | |
Experimenting with zero-knowledge proofs of training | Sanjam Garg Aarushi Goel Somesh Jha Saeed Mahloujifar Mohammad Mahmoody | 2023/11/15 | |
On optimal learning under targeted data poisoning | Advances in Neural Information Processing Systems | Steve Hanneke Amin Karbasi Mohammad Mahmoody Idan Mehalel Shay Moran | 2022/12/6 |
Lower bounds for the number of decryption updates in registration-based encryption | Mohammad Mahmoody Wei Qi Ahmadreza Rahimi | 2022/11/7 | |
Overparameterization from Computational Constraints | Advances in Neural Information Processing Systems | Sanjam Garg Somesh Jha Saeed Mahloujifar Mohammad Mahmoody Mingyuan Wang | 2022/12/6 |
On the impossibility of key agreements from quantum random oracles | Per Austrin Hao Chung Kai-Min Chung Shiuan Fu Yao-Ting Lin | 2022/8/15 | |
Deletion inference, reconstruction, and compliance in machine (un) learning | arXiv preprint arXiv:2202.03460 | Ji Gao Sanjam Garg Mohammad Mahmoody Prashant Nalini Vasudevan | 2022/2/7 |
A separation result between data-oblivious and data-aware poisoning attacks | Advances in Neural Information Processing Systems | Samuel Deng Sanjam Garg Somesh Jha Saeed Mahloujifar Mohammad Mahmoody | 2021/12/6 |
Polynomial-time targeted attacks on coin tossing for any number of corruptions | Omid Etesami Ji Gao Saeed Mahloujifar Mohammad Mahmoody | 2021 | |
Neuracrypt is not private | arXiv preprint arXiv:2108.07256 | Nicholas Carlini Sanjam Garg Somesh Jha Saeed Mahloujifar Mohammad Mahmoody | 2021/8/16 |
Is private learning possible with instance encoding? | Nicholas Carlini Samuel Deng Sanjam Garg Somesh Jha Saeed Mahloujifar | 2021/5/24 | |
Learning and certification under instance-targeted poisoning | Ji Gao Amin Karbasi Mohammad Mahmoody | 2021/12/1 | |
Black-Box Uselessness: Composing Separations in Cryptography | Geoffroy Couteau Pooya Farshim Mohammad Mahmoody | 2021/2/4 | |
Lower bounds for adversarially robust PAC learning under evasion and hybrid attacks | Dimitrios I Diochnos Saeed Mahloujifar Mohammad Mahmoody | 2020/12/14 | |
Learning under p-tampering poisoning attacks | Annals of Mathematics and Artificial Intelligence | Saeed Mahloujifar Dimitrios I Diochnos Mohammad Mahmoody | 2020/7 |