Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A self-adaptive classification for the dissociating privacy agent., and . PST, page 44-50. IEEE Computer Society, (2013)Black-Box Audits for Group Distribution Shifts., , and . CoRR, (2022)Towards Understanding the Interplay of Generative Artificial Intelligence and the Internet., , , , , and . Epi UAI, volume 14523 of Lecture Notes in Computer Science, page 59-73. Springer, (2024)How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services., , , , and . CCS, page 2021-2036. ACM, (2017)FPDetective: dusting the web for fingerprinters., , , , , , and . CCS, page 1129-1140. ACM, (2013)A Critical Evaluation of Website Fingerprinting Attacks., , , , and . CCS, page 263-274. ACM, (2014)Website Fingerprinting Defenses at the Application Layer., , and . Proc. Priv. Enhancing Technol., 2017 (2): 186-203 (2017)Automated Website Fingerprinting through Deep Learning., , , , and . NDSS, The Internet Society, (2018)Online Platforms and the Fair Exposure Problem under Homophily., , , , , and . AAAI, page 11899-11908. AAAI Press, (2023)The Web Never Forgets: Persistent Tracking Mechanisms in the Wild., , , , , and . CCS, page 674-689. ACM, (2014)