Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Interdependent Privacy., , and . ACM Comput. Surv., 52 (6): 122:1-122:40 (2020)Membership Inference Against DNA Methylation Databases., , , , , , and . EuroS&P, page 509-520. IEEE, (2020)Learning From the Past to Improve the Future, , , and . Business & Information Systems Engineering, (Feb 14, 2022)Quantifying Privacy Risks of Prompts in Visual Prompt Learning., , , , , , and . CoRR, (2023)Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission., , , and . USENIX Security Symposium, page 1813-1830. USENIX Association, (2022)MBeacon: Privacy-Preserving Beacons for DNA Methylation Data., , , , , , and . NDSS, The Internet Society, (2019)Towards Plausible Graph Anonymization., , , , , and . NDSS, The Internet Society, (2020)On Non-cooperative Genomic Privacy., , , and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 407-426. Springer, (2015)When Machine Unlearning Jeopardizes Privacy., , , , , and . CCS, page 896-911. ACM, (2021)GenoShare: Supporting Privacy-Informed Decisions for Sharing Individual-Level Genetic Data., , , , , , and . AMIA, AMIA, (2020)