Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

No Please, After You: Detecting Fraud in Affiliate Marketing Networks., and . WEIS, (2015)A General Framework For Task-Oriented Network Inference., , and . CoRR, (2017)Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement., , , and . CCS, page 2401-2414. ACM, (2022)Evaluating Social Networks Using Task-Focused Network Inference., , and . CoRR, (2017)DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps., , , , , and . CIKM, page 2027-2035. ACM, (2018)An Empirical Analysis of the Commercial VPN Ecosystem., , , , , and . Internet Measurement Conference, page 443-456. ACM, (2018)Leveraging Machine Learning to Improve Unwanted Resource Filtering., , , , and . AISec@CCS, page 95-102. ACM, (2014)Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies., , , and . CoRR, (2023)Tales of Favicons and Caches: Persistent Tracking in Modern Browsers., , , and . NDSS, The Internet Society, (2021)Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage., , , , , , and . USENIX Security Symposium, page 1145-1162. USENIX Association, (2021)