From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Smart, useful, scary, creepy: perceptions of online behavioral advertising., , , , и . SOUPS, стр. 4. ACM, (2012)Helping Users Debug Trigger-Action Programs., , , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (4): 196:1-196:32 (2022)Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks., , , , , , и . USENIX Security Symposium, стр. 175-191. USENIX Association, (2016)Summarizing Sets of Related ML-Driven Recommendations for Improving File Management in Cloud Storage., , , и . UIST, стр. 95:1-95:11. ACM, (2022)Trigger-Action Programming in the Wild: An Analysis of 200, 000 IFTTT Recipes., , , , , , , и . CHI, стр. 3227-3231. ACM, (2016)SoK: Context Sensing for Access Control in the Adversarial Home IoT., , , , , , и . EuroS&P, стр. 37-53. IEEE, (2021)Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization., , , , , , и . CHI, стр. 493. ACM, (2018)Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters., , , и . CHI, стр. 549:1-549:18. ACM, (2021)Visualizing Differences to Improve End-User Understanding of Trigger-Action Programs., , , , и . CHI Extended Abstracts, стр. 1-10. ACM, (2020)Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media., , , , , , , , и . CCS, стр. 991-1008. ACM, (2019)