Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ePrivateeye: to the edge and beyond!, , , , , , , and . SEC, page 18:1-18:13. ACM, (2017)Permissions Plugins as Android Apps., , , , and . MobiSys, page 180-192. ACM, (2019)On methods for privacy-preserving energy disaggregation., , , , , , and . ICASSP, page 6404-6408. IEEE, (2017)Image Retrieval Using Eigen Queries., , and . ACCV (2), volume 7725 of Lecture Notes in Computer Science, page 461-474. Springer, (2012)One word at a time: adversarial attacks on retrieval models., and . CoRR, (2020)MarkIt: privacy markers for protecting visual secrets., , , , and . UbiComp Adjunct, page 1289-1295. ACM, (2014)Efficient Evaluation of SVM Classifiers Using Error Space Encoding., , and . ICPR, page 4411-4416. IEEE Computer Society, (2014)A Demonstration of VisDPT: Visual Exploration of Differentially Private Trajectories., , and . Proc. VLDB Endow., 9 (13): 1489-1492 (2016)Olympus: Sensor Privacy through Utility Aware Obfuscation., , and . Proc. Priv. Enhancing Technol., 2019 (1): 5-25 (2019)What You Mark is What Apps See., , , , , and . MobiSys, page 249-261. ACM, (2016)