From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protecting Privacy of BLE Device Users., , и . USENIX Security Symposium, стр. 1205-1221. USENIX Association, (2016)Automated Cookie Notice Analysis and Enforcement., , , и . USENIX Security Symposium, стр. 1109-1126. USENIX Association, (2023)"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit., , , , , , и . SP, стр. 2850-2866. IEEE, (2023)Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems., , и . ICML, том 162 из Proceedings of Machine Learning Research, стр. 7102-7121. PMLR, (2022)D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles., , , , , и . WACV, стр. 3800-3810. IEEE, (2024)A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok., , , , , и . CoRR, (2024)BlackOut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Voice Assistants, , , , и . arXiv preprint arXiv:1812.00263, (2018)Anatomization and Protection of Mobile Apps' Location Privacy Threats., , и . USENIX Security Symposium, стр. 753-768. USENIX Association, (2015)Human-Producible Adversarial Examples., , , , , и . CoRR, (2023)Analyzing Accuracy Loss in Randomized Smoothing Defenses., , , , и . CoRR, (2020)