From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises., , , , , , , и . RAID, том 10453 из Lecture Notes in Computer Science, стр. 287-310. Springer, (2017)How Risky Are Real Users' IFTTT Applets?, , , , , , и . SOUPS @ USENIX Security Symposium, стр. 505-529. USENIX Association, (2020)Proof Complexity of Monotone Branching Programs., и . CiE, том 13359 из Lecture Notes in Computer Science, стр. 74-87. Springer, (2022)Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps., , , , и . COMPASS, стр. 215-229. ACM, (2021)Understanding and mitigating the privacy risks of smartphone sensor fingerprinting. University of Illinois Urbana-Champaign, USA, (2016)MetaMorphosis: Task-oriented Privacy Cognizant Feature Generation for Multi-task Learning., , , и . IoTDI, стр. 288-300. ACM, (2023)Understanding People's Attitude and Concerns towards Adopting IoT Devices., , и . CHI Extended Abstracts, стр. 307:1-307:10. ACM, (2021)Beyond formulas-as-cographs: an extension of Boolean logic to arbitrary graphs., , и . CoRR, (2020)From positive and intuitionistic bounded arithmetic to monotone proof complexity.. LICS, стр. 126-135. ACM, (2016)Analyzing an adaptive reputation metric for anonymity systems., , и . HotSoS, стр. 11. ACM, (2014)