Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System., , and . CoRR, (2017)Transpose Attack: Stealing Datasets with Bidirectional Training., , and . CoRR, (2023)TTTS: Tree Test Time Simulation for Enhancing Decision Tree Robustness against Adversarial Examples., , , and . AAAI, page 20993-21000. AAAI Press, (2024)DANTE: A Framework for Mining and Monitoring Darknet Traffic., , , , , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 88-109. Springer, (2020)User Verification on Mobile Devices Using Sequences of Touch Gestures., , , and . UMAP, page 365-366. ACM, (2017)IPatch: A Remote Adversarial Patch.. CoRR, (2021)Discussion Paper: The Threat of Real Time Deepfakes., and . WDC@AsiaCCS, page 20-23. ACM, (2023)Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains., , , , , , and . SOCS, page 70-77. AAAI Press, (2015)Deepfake CAPTCHA: A Method for Preventing Fake Calls., , , and . AsiaCCS, page 608-622. ACM, (2023)VulChecker: Graph-based Vulnerability Localization in Source Code., , , , , , , and . USENIX Security Symposium, page 6557-6574. USENIX Association, (2023)