Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating Stateful Defenses Against Black-Box Adversarial Examples., , , , , and . CoRR, (2023)Unbiased Face Synthesis With Diffusion Models: Are We There Yet?, , , , and . CoRR, (2023)Scale-Adv: A Joint Attack on Image-Scaling and Machine Learning Classifiers., and . CoRR, (2021)SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks., , , , and . CoRR, (2022)"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality., , , , , , , , and . CoRR, (2023)Pipe Overflow: Smashing Voice Authentication for Fun and Profit., , , , , , and . CoRR, (2022)Automated Cookie Notice Analysis and Enforcement., , , and . USENIX Security Symposium, page 1109-1126. USENIX Association, (2023)Protecting Privacy of BLE Device Users., , and . USENIX Security Symposium, page 1205-1221. USENIX Association, (2016)Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems., , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 7102-7121. PMLR, (2022)"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit., , , , , , and . SP, page 2850-2866. IEEE, (2023)