Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Layer-wise Characterization of Latent Information Leakage in Federated Learning., , , , and . CoRR, (2020)Resolving the Predicament of Android Custom Permissions., , , and . NDSS, The Internet Society, (2018)Identity, location, disease and more: inferring your secrets from android public resources., , , , , , , and . ACM Conference on Computer and Communications Security, page 1017-1028. ACM, (2013)What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources., , , , , , and . NDSS, The Internet Society, (2015)Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android., , , , and . NDSS, The Internet Society, (2014)Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be., , , , , , , , , and 4 other author(s). CoRR, (2017)BEEER: distributed record and replay for medical devices in hospital operating rooms., , , and . HotSoS, page 1:1-1:10. ACM, (2019)Free for All! Assessing User Data Exposure to Advertising Libraries on Android., , , , and . NDSS, The Internet Society, (2016)HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps., , , , , , and . WISEC, page 122-133. ACM, (2017)Discovering the invisible city: Location-based games for learning in smart cities., , , and . IxD&A, (2013)