From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect., , , , и . CVPR, стр. 14666-14675. Computer Vision Foundation / IEEE, (2021)Data Privacy in Trigger-Action Systems., , , , , и . SP, стр. 501-518. IEEE, (2021)SoK: Authentication in Augmented and Virtual Reality., , , , , и . SP, стр. 267-284. IEEE, (2022)ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms., , , , , , и . NDSS, The Internet Society, (2017)Experimental Security Analysis of Sensitive Data Access by Browser Extensions., , , и . WWW, стр. 1283-1294. ACM, (2024)My OS Ought to Know Me Better: In-app Behavioural Analytics as an OS Service., , и . HotOS, USENIX Association, (2015)Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect., , , , и . CoRR, (2020)Practical Data Access Minimization in Trigger-Action Platforms., , , , и . USENIX Security Symposium, стр. 2929-2945. USENIX Association, (2022)FlowFence: Practical Data Protection for Emerging IoT Application Frameworks., , , , , и . USENIX Security Symposium, стр. 531-548. USENIX Association, (2016)Tyche: A Risk-Based Permission Model for Smart Homes., , , и . SecDev, стр. 29-36. IEEE Computer Society, (2018)