Author of the publication

Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries.

, , , and . Proc. Priv. Enhancing Technol., 2019 (2): 146-165 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit., , , , , , and . SP, page 2850-2866. IEEE, (2023)Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems., , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 7102-7121. PMLR, (2022)Protecting Privacy of BLE Device Users., , and . USENIX Security Symposium, page 1205-1221. USENIX Association, (2016)Automated Cookie Notice Analysis and Enforcement., , , and . USENIX Security Symposium, page 1109-1126. USENIX Association, (2023)D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles., , , , , and . WACV, page 3800-3810. IEEE, (2024)A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok., , , , , and . CoRR, (2024)BlackOut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Voice Assistants, , , , and . arXiv preprint arXiv:1812.00263, (2018)Human-Producible Adversarial Examples., , , , , and . CoRR, (2023)CRUST: Implementation of clustering and routing functions for mobile ad hoc networks using reactive tuple-spaces., , and . Ad Hoc Networks, 7 (6): 1064-1081 (2009)Analyzing Accuracy Loss in Randomized Smoothing Defenses., , , , and . CoRR, (2020)