From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Need for Respectful Technologies: Going Beyond Privacy.. Perspectives on Digital Humanism, (2022)An Inside Look into the Practice of Malware Analysis., , , , , и . CCS, стр. 3053-3069. ACM, (2021)Human Perceptions of Fairness in Algorithmic Decision Making: A Case Study of Criminal Risk Prediction., , , и . WWW, стр. 903-912. ACM, (2018)Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics., , и . CHI, стр. 931-936. ACM, (2017)"Nudes? Shouldn't I charge for these?": Motivations of New Sexual Content Creators on OnlyFans., , , и . CHI, стр. 666:1-666:14. ACM, (2023)Detecting fraud, corruption, and collusion in international development contracts: The design of a proof-of-concept automated system., , , и . IEEE BigData, стр. 1444-1453. IEEE Computer Society, (2016)AMP: authentication of media via provenance., , , , , , , , , и 10 other автор(ы). MMSys, стр. 108-121. ACM, (2021)Leveraging Rights of Data Subjects for Social Media Analysis: Studying TikTok via Data Donations., , , , , , и . CoRR, (2023)The Role of Privacy Guarantees in Voluntary Donation of Private Data for Altruistic Goals., , , и . CoRR, (2024)SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors., , , , , и . USENIX Security Symposium, USENIX Association, (2024)