Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking graph-based IoT malware detection systems using adversarial examples: poster., , , , , , and . WiSec, page 290-291. ACM, (2019)Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications., , , and . ICDCS, page 464-473. IEEE, (2020)SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals., , and . WPES@CCS, page 209-221. ACM, (2021)A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments., , , and . VR, page 765-774. IEEE, (2022)AcousticType: Smartwatch-Enabled Cross-Device Text Entry Method Using Keyboard Acoustics., , and . CHI Extended Abstracts, page 352:1-352:7. ACM, (2022)Automated Privacy Policy Annotation with Information Highlighting Made Practical Using Deep Representations., , , and . CCS, page 2378-2380. ACM, (2021)AiRType: An Air-tapping Keyboard for Augmented Reality Environments., , and . VR Workshops, page 676-677. IEEE, (2022)Learning Location From Shared Elevation Profiles in Fitness Apps: A Privacy Perspective., , , and . IEEE Trans. Mob. Comput., 23 (1): 581-596 (January 2024)TLDR: Deep Learning-Based Automated Privacy Policy Annotation with Key Policy Highlights., , , and . WPES@CCS, page 103-118. ACM, (2021)