Author of the publication

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.

, , , and . CCS, page 1528-1540. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Expectations and Preferences in an IoT World., , , , , , and . SOUPS, page 399-412. USENIX Association, (2017)(How) Do people change their passwords after a breach?, , and . CoRR, (2020)Measuring and Increasing the Reach of Security Information Through Online Media.. Carnegie Mellon University, USA, (2021)Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition., , , and . CCS, page 1528-1540. ACM, (2016)A General Framework for Adversarial Examples with Objectives., , , and . ACM Trans. Priv. Secur., 22 (3): 16:1-16:30 (2019)Ädulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-27 (2022)What breach? Measuring online awareness of security incidents by studying real-world browsing behavior., , and . CoRR, (2020)What breach? Measuring online awareness of security incidents by studying real-world browsing behavior., , and . EuroUSEC, page 180-199. ACM, (2021)Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences., , , , , , , , , and 3 other author(s). ICDCS Workshops, page 193-198. IEEE Computer Society, (2017)Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition., , , and . CoRR, (2018)