Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Data Access Minimization in Trigger-Action Platforms., , , , and . USENIX Security Symposium, page 2929-2945. USENIX Association, (2022)Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse., , , , and . USENIX Security Symposium, page 69-86. USENIX Association, (2023)Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect., , , , and . CoRR, (2020)Towards Finding the Missing Pieces to Teach Secure Programming Skills to Students., , , , and . SIGCSE (1), page 973-979. ACM, (2023)MAESTRO: Making Art-Enabled Sketches through Randomized Operations., , , and . CAIP (1), volume 6854 of Lecture Notes in Computer Science, page 318-326. Springer, (2011)Camouflage: Utility-Aware Obfuscation for Accurate Simulation of Sensitive Program Traces., , , and . ACM Trans. Archit. Code Optim., 21 (2): 36 (June 2024)Data Privacy in Trigger-Action IoT Systems., , , , , and . CoRR, (2020)Next Generation Password-Based Authentication Systems.. Cornell University, USA, (2019)Scalable Metadata-Hiding for Privacy-Preserving IoT Systems., , , and . Proc. Priv. Enhancing Technol., 2024 (4): 649-664 (2024)BlindTLS: Circumventing TLS-based HTTPS censorship., and . FOCI@SIGCOMM, page 43-49. ACM, (2021)