default search action
Amira Guesmi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation. IEEE Access 12: 13571-13585 (2024) - [c8]Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique:
DAP: A Dynamic Adversarial Patch for Evading Person Detectors. CVPR 2024: 24595-24604 - [c7]Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
Defending against Adversarial Patches using Dimensionality Reduction. DAC 2024: 222:1-222:6 - [i19]Nandish Chattopadhyay, Amira Guesmi, Muhammad Shafique:
Anomaly Unveiled: Securing Image Classification against Adversarial Patch Attacks. CoRR abs/2402.06249 (2024) - [i18]Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique:
SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications. CoRR abs/2403.11515 (2024) - [i17]Nishant Suresh Aswani, Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique:
Examining Changes in Internal Representations of Continual Learning Models Through Tensor Decomposition. CoRR abs/2405.03244 (2024) - [i16]Amira Guesmi, Nishant Suresh Aswani, Muhammad Shafique:
Exploring the Interplay of Interpretability and Robustness in Deep Neural Networks: A Saliency-guided Approach. CoRR abs/2405.06278 (2024) - [i15]Amira Guesmi, Muhammad Shafique:
Navigating Threats: A Survey of Physical Adversarial Attacks on LiDAR Perception Systems in Autonomous Vehicles. CoRR abs/2409.20426 (2024) - 2023
- [j3]Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
Physical Adversarial Attacks for Camera-Based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook. IEEE Access 11: 109617-109668 (2023) - [j2]Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique:
AdvRain: Adversarial Raindrops to Attack Camera-Based Smart Vision Systems. Inf. 14(12): 634 (2023) - [c6]Ayoub Arous, Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique:
Exploring Machine Learning Privacy/Utility Trade-Off from a Hyperparameters Lens. IJCNN 2023: 1-10 - [i14]Amira Guesmi, Muhammad Abdullah Hanif, Muhammad Shafique:
AdvRain: Adversarial Raindrops to Attack Camera-based Smart Vision Systems. CoRR abs/2303.01338 (2023) - [i13]Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique:
APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation. CoRR abs/2303.01351 (2023) - [i12]Amira Guesmi, Ioan Marius Bilasco, Muhammad Shafique, Ihsen Alouani:
AdvART: Adversarial Art for Camouflaged Object Detection Attacks. CoRR abs/2303.01734 (2023) - [i11]Ayoub Arous, Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique:
Exploring Machine Learning Privacy/Utility trade-off from a hyperparameters Lens. CoRR abs/2303.01819 (2023) - [i10]Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique:
DAP: A Dynamic Adversarial Patch for Evading Person Detectors. CoRR abs/2305.11618 (2023) - [i9]Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
SAAM: Stealthy Adversarial Attack on Monoculor Depth Estimation. CoRR abs/2308.03108 (2023) - [i8]Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammed Shafique:
Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook. CoRR abs/2308.06173 (2023) - [i7]Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches. CoRR abs/2311.12084 (2023) - [i6]Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique:
DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction. CoRR abs/2311.12211 (2023) - 2022
- [j1]Amira Guesmi, Ihsen Alouani, Mouna Baklouti, Tarek Frikha, Mohamed Abid:
SIT: Stochastic Input Transformation to Defend Against Adversarial Attacks on Deep Neural Networks. IEEE Des. Test 39(3): 63-72 (2022) - [c5]Amira Guesmi, Khaled N. Khasawneh, Nael B. Abu-Ghazaleh, Ihsen Alouani:
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints. IJCNN 2022: 1-10 - [c4]Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique:
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems. VTS 2022: 1-14 - [i5]Amira Guesmi, Khaled N. Khasawneh, Nael B. Abu-Ghazaleh, Ihsen Alouani:
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints. CoRR abs/2201.01621 (2022) - [i4]Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique:
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems. CoRR abs/2204.09514 (2022) - [i3]Amira Guesmi, Ihsen Alouani:
Adversarial Attack on Radar-based Environment Perception Systems. CoRR abs/2211.01112 (2022) - [i2]Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael B. Abu-Ghazaleh:
Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks. CoRR abs/2211.01182 (2022) - 2021
- [c3]Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael B. Abu-Ghazaleh:
Defensive approximation: securing CNNs using approximate computing. ASPLOS 2021: 990-1003 - 2020
- [i1]Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael B. Abu-Ghazaleh:
Defensive Approximation: Enhancing CNNs Security through Approximate Computing. CoRR abs/2006.07700 (2020)
2010 – 2019
- 2019
- [c2]Dhouha El Houssaini, Amira Guesmi, Sabrine Khriji, Thomas Keutel, Kamel Besbes, Olfa Kanoun:
Experimental Investigation on Weather Changes Influences on Wireless Localization System. M&N 2019: 1-6 - [c1]Amira Guesmi, Ihsen Alouani, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Atika Rivenq:
HEAP: A Heterogeneous Approximate Floating-Point Multiplier for Error Tolerant Applications. RSP 2019: 36-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint