Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications., , and . USENIX Security Symposium, page 5467-5484. USENIX Association, (2023)Shooter Localization Based on TDOA and N-Shape Length Measurements of Distributed Microphones., , , and . FUSION, page 1-8. IEEE, (2021)Raccoon: automated verification of guarded race conditions in web applications., , , and . SAC, page 1678-1687. ACM, (2020)Using Algorithm Selection for Adaptive Vehicle Perception Aboard UAV., , and . AVSS, page 1-8. IEEE, (2019)FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities., , , , and . NDSS, The Internet Society, (2023)Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications., , , and . CCS, page 3576-3578. ACM, (2023)Keeping Privacy Labels Honest., , , , and . Proc. Priv. Enhancing Technol., 2022 (4): 486-506 (2022)Contract design with socially attentive preferences., and . Games Econ. Behav., (2021)Manufacturing of polygon fiber reinforced plastic profiles by rotational molding and intrinsic hybridization., , and . Prod. Eng., 9 (3): 317-328 (2015)Finite element optimisation for rotational moulding with a core to manufacture intrinsic hybrid FRP metal pipes., , , , and . Prod. Eng., 12 (2): 239-247 (2018)