From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Watching videos from everywhere: a study of the PPTV mobile VoD system., , , , , , и . Internet Measurement Conference, стр. 185-198. ACM, (2012)On the Privacy of the Opal Data Release: A Response., , и . CoRR, (2017)Private Processing of Outsourced Network Functions: Feasibility and Constructions., , , и . IACR Cryptology ePrint Archive, (2015)Betrayed by Your Ads! - Reconstructing User Profiles from Targeted Ads., , и . Privacy Enhancing Technologies, том 7384 из Lecture Notes in Computer Science, стр. 1-17. Springer, (2012)Cross social networks interests predictions based ongraph features., , , , и . RecSys, стр. 319-322. ACM, (2013)Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading., , , , , и . ACM Trans. Priv. Secur., 23 (2): 8:1-8:27 (2020)Privacy in content-oriented networking: threats and countermeasures., , , и . Comput. Commun. Rev., 43 (3): 25-33 (2013)On the potential of recommendation technologies for efficient content delivery networks., , и . Comput. Commun. Rev., 43 (3): 74-77 (2013)Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking., , , и . Proc. Priv. Enhancing Technol., 2018 (2): 122-142 (2018)Unsupervised Learning for security of Enterprise networks by micro-segmentation., , и . CoRR, (2020)