Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RobArch: Designing Robust Architectures against Adversarial Attacks., , , , , , and . CoRR, (2023)Anonysense: privacy-aware people-centric sensing., , , , , and . MobiSys, page 211-224. ACM, (2008)AnonySense: Opportunistic and Privacy-Preserving Context Collection., , , , and . Pervasive, volume 5013 of Lecture Notes in Computer Science, page 280-297. Springer, (2008)An amulet for trustworthy wearable mHealth., , , , , , , , and . HotMobile, page 7. ACM, (2012)Investigating the Adversarial Robustness of Density Estimation Using the Probability Flow ODE., , , and . CoRR, (2023)ZEBRA: Zero-Effort Bilateral Recurring Authentication., , , , and . IEEE Symposium on Security and Privacy, page 705-720. IEEE Computer Society, (2014)Talk Proposal: Towards the Realistic Evaluation of Evasion Attacks using CARLA., , , and . CoRR, (2019)DEAMON: Energy-efficient Sensor Monitoring., , , and . SECON, page 1-9. IEEE, (2009)Adaptive Security and Privacy for mHealth Sensing., , , , and . HealthSec, USENIX Association, (2011)ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector., , , and . ECML/PKDD (1), volume 11051 of Lecture Notes in Computer Science, page 52-68. Springer, (2018)