Author of the publication

Protecting mobile devices from physical memory attacks with targeted encryption.

, , , , , , and . WiSec, page 34-44. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Region-Wise Attack: On Efficient Generation of Robust Physical Adversarial Examples., and . CoRR, (2019)Gender, Smoking History, and Age Prediction from Laryngeal Images., , , , , , , and . J. Imaging, 9 (6): 109 (2023)You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi., , , , and . USENIX Security Symposium, page 55-72. USENIX Association, (2020)You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps., , , and . TrustCom, page 114-121. IEEE, (2021)Video text extraction using temporal feature vectors., , , , and . ICME (1), page 85-88. IEEE Computer Society, (2002)Mining Adverse Drug Side-Effects from Online Medical Forums., , and . HISB, page 150. IEEE Computer Society, (2012)Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain., , , and . CCS, page 2561-2563. ACM, (2019)In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems., , , , , , and . SUTC (1), page 252-259. IEEE Computer Society, (2006)Identification of transposable elements of the giant panda (Ailuropoda melanoleuca) genome., , , , , and . BIBM Workshops, page 674-681. IEEE Computer Society, (2012)A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping., , , and . INFOCOM, page 2820-2828. IEEE, (2010)