Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect., , , , and . CoRR, (2020)Practical Data Access Minimization in Trigger-Action Platforms., , , , and . USENIX Security Symposium, page 2929-2945. USENIX Association, (2022)Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse., , , , and . USENIX Security Symposium, page 69-86. USENIX Association, (2023)MAESTRO: Making Art-Enabled Sketches through Randomized Operations., , , and . CAIP (1), volume 6854 of Lecture Notes in Computer Science, page 318-326. Springer, (2011)Towards Finding the Missing Pieces to Teach Secure Programming Skills to Students., , , , and . SIGCSE (1), page 973-979. ACM, (2023)Textbook Underflow: Insufficient Security Discussions in Textbooks Used for Computer Systems Courses., , , , and . SIGCSE, page 1212-1218. ACM, (2021)Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms., , , , , and . CCS, page 1171-1186. ACM, (2019)BlindTLS: Circumventing TLS-based HTTPS censorship., and . FOCI@SIGCOMM, page 43-49. ACM, (2021)"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence., , , , , , and . Proc. ACM Hum. Comput. Interact., 3 (CSCW): 202:1-202:24 (2019)Next Generation Password-Based Authentication Systems.. Cornell University, USA, (2019)