From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect., , , , и . CoRR, (2020)Practical Data Access Minimization in Trigger-Action Platforms., , , , и . USENIX Security Symposium, стр. 2929-2945. USENIX Association, (2022)Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse., , , , и . USENIX Security Symposium, стр. 69-86. USENIX Association, (2023)Towards Finding the Missing Pieces to Teach Secure Programming Skills to Students., , , , и . SIGCSE (1), стр. 973-979. ACM, (2023)MAESTRO: Making Art-Enabled Sketches through Randomized Operations., , , и . CAIP (1), том 6854 из Lecture Notes in Computer Science, стр. 318-326. Springer, (2011)Camouflage: Utility-Aware Obfuscation for Accurate Simulation of Sensitive Program Traces., , , и . ACM Trans. Archit. Code Optim., 21 (2): 36 (июня 2024)Data Privacy in Trigger-Action IoT Systems., , , , , и . CoRR, (2020)Next Generation Password-Based Authentication Systems.. Cornell University, USA, (2019)Scalable Metadata-Hiding for Privacy-Preserving IoT Systems., , , и . Proc. Priv. Enhancing Technol., 2024 (4): 649-664 (2024)BlindTLS: Circumventing TLS-based HTTPS censorship., и . FOCI@SIGCOMM, стр. 43-49. ACM, (2021)