Author of the publication

User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.

, , , , , and . EuroS&P, page 323-337. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time P and R wave detection in exercise electrocardiogram., , and . WSTST, volume 29 of Advances in Soft Computing, page 591-603. Springer, (2005)Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps., , , and . SOUPS, page 241-255. USENIX Association, (2015)A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules., , , , , , , , , and . CoRR, (2017)Lip Reading from Multi View Facial Images Using 3D-AAM., , and . ACCV Workshops (2), volume 10117 of Lecture Notes in Computer Science, page 303-316. Springer, (2016)I know what you did last login: inconsistent messages tell existence of a target's account to insiders., , , and . ACSAC, page 732-746. ACM, (2019)Endogenous Bioactive Peptides as Potential Biomarkers for Atherosclerotic Coronary Heart Disease., , , , , and . Sensors, 12 (4): 4974-4985 (2012)Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps., , , , and . IEICE Trans. Inf. Syst., 101-D (11): 2584-2599 (2018)APPraiser: A Large Scale Analysis of Android Clone Apps., , , and . IEICE Trans. Inf. Syst., 100-D (8): 1703-1713 (2017)Relaxation DAC with positive and negative polarity output using high-pass filter., , , , , , , , , and . IEICE Electron. Express, 20 (4): 20220536 (2023)Prediction of regional goods demand incorporating the effect of weather., , , , , and . IEEE BigData, page 3785-3791. IEEE Computer Society, (2016)