Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps., and . CODASPY, page 127-138. ACM, (2017)Hark: A Deep Learning System for Navigating Privacy Feedback at Scale., , , , and . SP, page 2469-2486. IEEE, (2022)Automated Cookie Notice Analysis and Enforcement., , , and . USENIX Security Symposium, page 1109-1126. USENIX Association, (2023)280 Birds With One Stone: Inducing Multilingual Taxonomies From Wikipedia Using Character-Level Classification., , , and . AAAI, page 4824-4831. AAAI Press, (2018)Have Your Text and Use It Too! End-to-End Neural Data-to-Text Generation with Semantic Fidelity., , and . COLING, page 2410-2424. International Committee on Computational Linguistics, (2020)Data-Driven, Personalized Usable Privacy.. EPFL, Switzerland, (2017)PriSEC: A Privacy Settings Enforcement Controller., , , and . USENIX Security Symposium, page 465-482. USENIX Association, (2021)A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends., , , , , , and . CoRR, (2024)280 Birds with One Stone: Inducing Multilingual Taxonomies from Wikipedia using Character-level Classification., , , and . CoRR, (2017)PriBots: Conversational Privacy with Chatbots., , , and . WSF@SOUPS, USENIX Association, (2016)