Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond formulas-as-cographs: an extension of Boolean logic to arbitrary graphs., , and . CoRR, (2020)Understanding and mitigating the privacy risks of smartphone sensor fingerprinting. University of Illinois Urbana-Champaign, USA, (2016)MetaMorphosis: Task-oriented Privacy Cognizant Feature Generation for Multi-task Learning., , , and . IoTDI, page 288-300. ACM, (2023)Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises., , , , , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 287-310. Springer, (2017)Understanding People's Attitude and Concerns towards Adopting IoT Devices., , and . CHI Extended Abstracts, page 307:1-307:10. ACM, (2021)How Risky Are Real Users' IFTTT Applets?, , , , , , and . SOUPS @ USENIX Security Symposium, page 505-529. USENIX Association, (2020)Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps., , , , and . COMPASS, page 215-229. ACM, (2021)Proof Complexity of Monotone Branching Programs., and . CiE, volume 13359 of Lecture Notes in Computer Science, page 74-87. Springer, (2022)From positive and intuitionistic bounded arithmetic to monotone proof complexity.. LICS, page 126-135. ACM, (2016)Analyzing an adaptive reputation metric for anonymity systems., , and . HotSoS, page 11. ACM, (2014)