From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attacking Speaker Recognition Systems with Phoneme Morphing., , и . ESORICS (1), том 11735 из Lecture Notes in Computer Science, стр. 471-492. Springer, (2019)Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles., , , и . VNC, стр. 1-8. IEEE, (2018)Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating., , и . EuroS&P, стр. 184-197. IEEE, (2020)#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones., , , и . ACM Trans. Priv. Secur., 24 (4): 31:1-31:34 (2021)IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients., , , , , и . CoRR, (2020)Safety vs. Security: Attacking Avionic Systems with Humans in the Loop., , , , и . CoRR, (2019)QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband., , , и . CoRR, (2020)28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics., , , , и . CCS, стр. 1187-1199. ACM, (2019)RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection., , и . EICC, стр. 159-166. ACM, (2023)QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit., , , и . NDSS, The Internet Society, (2021)