Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic inference from natural language privacy policies and Android code.. ESEC/SIGSOFT FSE, page 940-943. ACM, (2018)GUILeak: tracing privacy policy claims on user input data for Android applications., , , , , and . ICSE, page 37-47. ACM, (2018)Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies., , , and . AAAI Fall Symposia, AAAI Press, (2016)Toward a framework for detecting privacy policy violations in android application code., , , , , , , and . ICSE, page 25-36. ACM, (2016)Extracting Information Types from Android Layout Code Using Sequence to Sequence Learning., , and . AAAI Workshops, volume WS-18 of AAAI Technical Report, page 767-770. AAAI Press, (2018)Ambiguity and Generality in Natural Language Privacy Policies., , , , and . RE, page 70-81. IEEE, (2021)Mobile Application Privacy Risk Assessments from User-authored Scenarios., , , and . RE, page 17-28. IEEE, (2023)Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types., , , , and . REFSQ, volume 12045 of Lecture Notes in Computer Science, page 97-115. Springer, (2020)Inferring Ontology Fragments from Semantic Role Typing of Lexical Variants., , and . REFSQ, volume 10753 of Lecture Notes in Computer Science, page 39-56. Springer, (2018)Analyzing privacy policies through syntax-driven semantic analysis of information types., , , , and . Inf. Softw. Technol., (2021)