Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Up-To-Crash: Evaluating Third-Party Library Updatability on Android., , , and . EuroS&P, page 15-30. IEEE, (2019)A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web., , , , and . USENIX Security Symposium, page 683-697. USENIX Association, (2020)PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models., , , , , , and . USENIX Security Symposium, page 1649-1666. USENIX Association, (2023)ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models., , , , , and . NDSS, The Internet Society, (2019)PrivSyn: Differentially Private Data Synthesis., , , , , , , and . CoRR, (2020)Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild., , , and . DSN, page 569-580. IEEE, (2021)Membership Inference Attacks by Exploiting Loss Trajectory., , , and . CCS, page 2085-2098. ACM, (2022)TrollThrottle - Raising the Cost of Astroturfing., , , , and . ACNS (2), volume 12147 of Lecture Notes in Computer Science, page 456-476. Springer, (2020)Periodicity detection in irregularly sampled light curves by robust regression and outlier detection., , , and . Stat. Anal. Data Min., 6 (1): 73-89 (2013)Membership Privacy for Fully Dynamic Group Signatures., , and . ACM Conference on Computer and Communications Security, page 2181-2198. ACM, (2019)