Author of the publication

Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh.

, , , , and . ICTD, page 11. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications., , , , and . NDSS, The Internet Society, (2020)SenRev: Measurement of Personal Information Disclosure in Online Health Communities., , , , and . Proc. Priv. Enhancing Technol., 2023 (3): 233-251 (July 2023)High Performance Approximate Computing by Adaptive Relaxed Synchronization., , and . HPCC/SmartCity/DSS, page 1204-1210. IEEE Computer Society, (2016)Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers., , , , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 4 (1): 16:1-16:28 (2020)Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh., , , , and . ICTD, page 11. ACM, (2016)Detecting Abnormal Behaviors in Smart Home., , , , , , , and . MASS Workshops, page 37-42. IEEE, (2019)Breaking Down the Defenses: A Comparative Survey of Attacks on Large Language Models., , , , , , and . CoRR, (2024)Side Channel Attacks in Computation Offloading Systems with GPU Virtualization., , , , and . IEEE Symposium on Security and Privacy Workshops, page 156-161. IEEE, (2019)Vulnerability detection in recent Android apps: An empirical study., , and . NSysS, page 55-63. IEEE, (2017)Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems., , , , and . WWW, page 1006-1017. ACM / IW3C2, (2020)