Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Talk Proposal: Towards the Realistic Evaluation of Evasion Attacks using CARLA., , , and . CoRR, (2019)The Efficacy of SHIELD under Different Threat Models.. CoRR, (2019)AnonySense: A system for anonymous opportunistic sensing., , , , , and . Pervasive Mob. Comput., 7 (1): 16-30 (2011)DEAMON: Energy-efficient Sensor Monitoring., , , and . SECON, page 1-9. IEEE, (2009)Adaptive Security and Privacy for mHealth Sensing., , , , and . HealthSec, USENIX Association, (2011)ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector., , , and . ECML/PKDD (1), volume 11051 of Lecture Notes in Computer Science, page 52-68. Springer, (2018)Location Privacy for Mobile Crowd Sensing through Population Mapping., , , , and . Sensors, 15 (7): 15285-15310 (2015)RobArch: Designing Robust Architectures against Adversarial Attacks., , , , , , and . CoRR, (2023)An amulet for trustworthy wearable mHealth., , , , , , , , and . HotMobile, page 7. ACM, (2012)Anonysense: privacy-aware people-centric sensing., , , , , and . MobiSys, page 211-224. ACM, (2008)