From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Peek-a-boo: i see your smart home activities, even encrypted!, , , , , , , , и . WISEC, стр. 207-218. ACM, (2020)HomeSnitch: behavior transparency and control for smart home IoT devices., , , , , и . WiSec, стр. 128-138. ACM, (2019)Host-Based Intrusion Detection for Advanced Mobile Devices., и . AINA (2), стр. 72-76. IEEE Computer Society, (2006)Enabling Technologies for Mobile Services: The MobiLife Book, , , , , , , , , и 6 other автор(ы). глава 6. Privacy, Trust and Group Communications, John Wiley & Sons, (октября 2007)LeakyPick: IoT Audio Spy Detector., , , , и . ACSAC, стр. 694-705. ACM, (2020)FLAME: Taming Backdoors in Federated Learning., , , , , , , , , и 3 other автор(ы). USENIX Security Symposium, стр. 1415-1432. USENIX Association, (2022)Privacy Preservation Approach in Service Ecosystems., , , и . EDOCW, стр. 283-292. IEEE Computer Society, (2011)Queryable Lossless Log Database Compression., , , и . KDID, стр. 70-79. Rudjer Boskovic Institute, Zagreb, Croatia, (2003)Towards security policy decisions based on context profiling., и . AISec, стр. 19-23. ACM, (2010)Context and communication profiling for IoT security and privacy: techniques and applications.. Darmstadt University of Technology, Germany, (2019)