Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authorship Attribution for Social Media Forensics., , , , , , , and . IEEE Trans. Inf. Forensics Secur., 12 (1): 5-33 (2017)Towards Continuous Access Control Validation and Forensics., , , , , , , , , and . CCS, page 113-129. ACM, (2019)Offloading in HCNs: Congestion-Aware Network Selection and User Incentive Design., , , , , and . IEEE Trans. Wirel. Commun., 16 (10): 6479-6492 (2017)Automatic Methods to Enhance Server Systems in Access Control Diagnosis. University of California, San Diego, USA, (2022)Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model., , , , , , and . USENIX Security Symposium, page 751-768. USENIX Association, (2021)Verba Volant, Scripta Manent: An Open Source Platform for Collecting Data to Train OCR Models for Manuscript Studies., , , , , , , , and . DH, page 386-389. Red de Humanidades Digitales A. C., (2018)Measuring Human Perception to Improve Handwritten Document Transcription., , , , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 44 (10): 6594-6601 (2022)Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis., , and . USENIX Security Symposium, page 7499-7516. USENIX Association, (2023)Improving Logging to Reduce Permission Over-Granting Mistakes., , and . USENIX Security Symposium, page 409-426. USENIX Association, (2023)Practical Text Phylogeny for Real-World Settings., , , and . IEEE Access, (2018)