Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Cookie Notice Analysis and Enforcement., , , and . USENIX Security Symposium, page 1109-1126. USENIX Association, (2023)Protecting Privacy of BLE Device Users., , and . USENIX Security Symposium, page 1205-1221. USENIX Association, (2016)Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems., , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 7102-7121. PMLR, (2022)"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit., , , , , , and . SP, page 2850-2866. IEEE, (2023)Do Large Code Models Understand Programming Concepts? Counterfactual Analysis for Code Predicates., , , , , and . ICML, OpenReview.net, (2024)A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok., , , , , and . SP, page 369-387. IEEE, (2024)D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles., , , , , and . WACV, page 3800-3810. IEEE, (2024)Anatomization and Protection of Mobile Apps' Location Privacy Threats., , and . USENIX Security Symposium, page 753-768. USENIX Association, (2015)CRUST: Implementation of clustering and routing functions for mobile ad hoc networks using reactive tuple-spaces., , and . Ad Hoc Networks, 7 (6): 1064-1081 (2009)BlackOut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Voice Assistants, , , , and . arXiv preprint arXiv:1812.00263, (2018)