Author of the publication

POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices.

, , , , , , , and . USENIX Security Symposium, page 1073-1090. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on construction and application of an evaluation system for regional road traffic safety., , and . Grey Syst. Theory Appl., 8 (4): 527-538 (2018)Enhancing effectiveness of density-based outlier mining scheme with density-similarity-neighbor-based outlier factor., , , and . Expert Syst. Appl., 37 (12): 8090-8101 (2010)SCRAPPOR: An Efficient Privacy-Preserving Algorithm Base on Sparse Coding for Information-Centric IoT., , , and . IEEE Access, (2018)Analysis and Design of High Integrated Low Noise Frequency Source in S Band., , and . ICSPS, page 194-197. ACM, (2017)A suspect point recheck method of fuzzy clustering for robot self-position estimation., , , , and . ICARCV, page 38-41. IEEE, (2014)Achieving Differential Privacy of Data Disclosure from Non-intrusive Load Monitoring in Smart Grid., , , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 32-42. Springer, (2017)Searching Decision Rules in Very Large Databases Using Rough Set Theory., and . Rough Sets and Current Trends in Computing, volume 2005 of Lecture Notes in Computer Science, page 346-353. Springer, (2000)Spatiotemporal Patterns of Urban Land Use Change in Typical Cities in the Greater Mekong Subregion (GMS)., , , , , and . Remote Sensing, 11 (7): 801 (2019)Differential games in large-scale sensor-actuator networks., , , , and . IPSN, page 77-84. ACM, (2006)InSphereNet: a Concise Representation and Classification Method for 3D Object., , , and . CoRR, (2019)