Author of the publication

Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps.

, , , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (4): 173:1-173:27 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genie: A Longitudinal Study Comparing Physical and Software-augmented Thermostats in Office Buildings., , , and . CoRR, (2016)Kirigami: Lightweight Speech Filtering for Privacy-Preserving Activity Recognition using Audio., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 8 (1): 36:1-36:28 (March 2024)Mites: Design and Deployment of a General-Purpose Sensing Infrastructure for Buildings., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 7 (1): 2:1-2:32 (March 2023)VAX: Using Existing Video and Audio-based Activity Recognition Models to Bootstrap Privacy-Sensitive Sensors., , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 7 (3): 117:1-117:24 (September 2023)Real World Longitudinal iOS App Usage Study at Scale., , , and . CoRR, (2019)Understanding the Purpose of Permission Use in Mobile Apps., , , , and . ACM Trans. Inf. Syst., 35 (4): 43:1-43:40 (2017)Guest Editors' Introduction: Green Buildings., and . IEEE Des. Test Comput., 29 (4): 5-7 (2012)BuildingSherlock: fault management framework for HVAC systems: demo abstract., , , , and . BuildSys@SenSys, page 202-203. ACM, (2014)Ask the Experts: What Should Be on an IoT Privacy and Security Label?, , , and . SP, page 447-464. IEEE, (2020)Protecting Smart Homes from Unintended Application Actions., , and . ICCPS, page 270-281. IEEE, (2022)