Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ePrivateeye: to the edge and beyond!, , , , , , , and . SEC, page 18:1-18:13. ACM, (2017)Permissions Plugins as Android Apps., , , , and . MobiSys, page 180-192. ACM, (2019)On methods for privacy-preserving energy disaggregation., , , , , , and . ICASSP, page 6404-6408. IEEE, (2017)One word at a time: adversarial attacks on retrieval models., and . CoRR, (2020)Image Retrieval Using Eigen Queries., , and . ACCV (2), volume 7725 of Lecture Notes in Computer Science, page 461-474. Springer, (2012)MarkIt: privacy markers for protecting visual secrets., , , , and . UbiComp Adjunct, page 1289-1295. ACM, (2014)Efficient Evaluation of SVM Classifiers Using Error Space Encoding., , and . ICPR, page 4411-4416. IEEE Computer Society, (2014)What You Mark is What Apps See., , , , , and . MobiSys, page 249-261. ACM, (2016)LSH based outlier detection and its application in distributed setting., , , , and . CIKM, page 2289-2292. ACM, (2011)A Demonstration of VisDPT: Visual Exploration of Differentially Private Trajectories., , and . Proc. VLDB Endow., 9 (13): 1489-1492 (2016)