Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARTist: The Android Runtime Instrumentation and Security Toolkit., , , , and . EuroS&P, page 481-495. IEEE, (2017)Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup., , , , and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 286-313. Springer, (2019)UnGANable: Defending Against GAN-based Face Manipulation., , , , , and . CoRR, (2022)You Are How You Walk: Quantifying Privacy Risks in Step Count Data., , , , and . CoRR, (2023)Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights., , , , , , , and . CoRR, (2023)FAKEPCD: Fake Point Cloud Detection via Source Attribution., , , , and . CoRR, (2023)Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks., , and . Proc. Priv. Enhancing Technol., 2016 (2): 40-60 (2016)Fairwalk: Towards Fair Graph Embedding, , , and . Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, page 3289--3295. Macao, China, International Joint Conferences on Artificial Intelligence Organization, (August 2019)Proconda - Protected Control Data., , , and . CoRR, (2019)ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models., , , , , , , , and . CoRR, (2021)