Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking Common Sense: WHOOPS! A Vision-and-Language Benchmark of Synthetic and Compositional Images., , , , , , and . ICCV, page 2616-2627. IEEE, (2023)Detecting data misuse by applying context-based data linkage., , , and . Insider Threats@CCS, page 3-12. ACM, (2010)Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED., , , , and . CCS, page 1900-1914. ACM, (2021)Session details: AI for Forensics.. AISec@CCS, ACM, (2018)Cyber security patrol: detecting fake and vulnerable wifi-enabled printers., , , and . SAC, page 535-542. ACM, (2017)bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements., , , and . EuroS&P Workshops, page 376-383. IEEE, (2022)Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk., , , , and . ICNC-FSKD, page 1790-1793. IEEE, (2017)MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images., , and . IEEE Access, (2020)PRAW - A PRivAcy model for the Web., , , and . J. Assoc. Inf. Sci. Technol., 56 (2): 159-172 (2005)Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods., , and . Expert Syst. Appl., (2018)