Author of the publication

Methods for detecting probable COVID-19 cases from large-scale survey data also reveal probable sex differences in symptom profiles.

, , , , , , , , , and . Frontiers Big Data, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TemPredict: A Big Data Analytical Platform for Scalable Exploration and Monitoring of Personalized Multimodal Data for COVID-19., , , , , , , , , and 4 other author(s). IEEE BigData, page 4411-4420. IEEE, (2021)Black-box caches fingerprinting., , , and . CoNEXT, page 564-565. ACM, (2020)A Perfect Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software., , , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 173-194. Springer, (1999)Device Tracking via Linux's New TCP Source Port Selection Algorithm., , and . USENIX Security Symposium, page 6167-6183. USENIX Association, (2023)Domain Validation++ For MitM-Resilient PKI., , , , and . CCS, page 2060-2076. ACM, (2018)Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).. CoRR, (2020)Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version)., , and . CoRR, (2022)DNS Cache-Based User Tracking., and . NDSS, The Internet Society, (2019)Subverting Stateful Firewalls with Protocol States.. NDSS, The Internet Society, (2022)Flaw Label: Exploiting IPv6 Flow Label., , and . SP, page 1259-1276. IEEE, (2020)