Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles., , , and . VNC, page 1-8. IEEE, (2018)#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones., , , and . ACM Trans. Priv. Secur., 24 (4): 31:1-31:34 (2021)Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020., , and . CoRR, (2020)Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating., , and . EuroS&P, page 184-197. IEEE, (2020)On the Applicability of Satellite-Based Air Traffic Control Communication for Security., , , , and . IEEE Commun. Mag., 57 (9): 79-85 (2019)IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients., , , , , and . CoRR, (2020)Safety vs. Security: Attacking Avionic Systems with Humans in the Loop., , , , and . CoRR, (2019)RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection., , and . EICC, page 159-166. ACM, (2023)QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit., , , and . NDSS, The Internet Society, (2021)QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband., , , and . CoRR, (2020)