From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantifying Interdependent Risks in Genomic Privacy., , , и . ACM Trans. Priv. Secur., 20 (1): 3:1-3:31 (2017)One-to-n scrip systems for cooperative privacy-enhancing technologies., , и . Allerton, стр. 682-692. IEEE, (2011)A Study on the Use of Checksums for Integrity Verification of Web Downloads., , , , , и . ACM Trans. Priv. Secur., 24 (1): 4:1-4:36 (2020)Are Those Steps Worth Your Privacy?: Fitness-Tracker Users' Perceptions of Privacy and Utility., , , , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 5 (4): 181:1-181:41 (2021)Fine-Tuning Is All You Need to Mitigate Backdoor Attacks., , , , и . CoRR, (2022)Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers., , , и . USENIX Security Symposium, стр. 193-210. USENIX Association, (2023)An Empirical Study of the Use of Integrity Verification Mechanisms for Web Subresources., , , , и . WWW, стр. 34-45. ACM / IW3C2, (2020)Data Poisoning Attacks Against Multimodal Encoders., , , , , , и . ICML, том 202 из Proceedings of Machine Learning Research, стр. 39299-39313. PMLR, (2023)On Non-cooperative Genomic Privacy., , , и . Financial Cryptography, том 8975 из Lecture Notes in Computer Science, стр. 407-426. Springer, (2015)A Survey on Interdependent Privacy., , и . ACM Comput. Surv., 52 (6): 122:1-122:40 (2020)