Author of the publication

Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking.

, , , and . Proc. Priv. Enhancing Technol., 2018 (2): 122-142 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MANDERA: Malicious Node Detection in Federated Learning via Ranking., , , and . CoRR, (2021)On the Resilience of Biometric Authentication Systems against Random Inputs., , and . NDSS, The Internet Society, (2020)Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (5): 2088-2105 (2021)On mission Twitter Profiles: A Study of Selective Toxic Behavior., , , , , and . IEEE Big Data, page 3634-3643. IEEE, (2023)The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services., , , , , , , and . Proc. Priv. Enhancing Technol., 2021 (1): 209-228 (2021)Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users., , , , , and . CoRR, (2024)Unintended Memorization and Timing Attacks in Named Entity Recognition Models., , , , , and . CoRR, (2022)Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories., , , , and . ACNS (1), volume 13905 of Lecture Notes in Computer Science, page 284-308. Springer, (2023)A deep dive into the consistently toxic 1% of Twitter., , , , , and . CoRR, (2022)Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning., , and . CCSW, page 15-26. ACM, (2020)