Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks., , and . CoRR, (2020)A Framework for Inferring Combination Lock Codes using Smartwatches., , , and . CoRR, (2017)Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users., , , , and . CoRR, (2023)Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms., , , and . AsiaCCS, page 795-806. ACM, (2016)Wireless and Mobile Security Research and Teaching in the Post-Pandemic World., , , and . WISEC, page 4-5. ACM, (2022)Towards a Practical Pedestrian Distraction Detection Framework using Wearables., , , , , and . PerCom Workshops, page 239-245. IEEE Computer Society, (2018)Social Puzzles: Context-Based Access Control in Online Social Networks., , and . DSN, page 299-310. IEEE Computer Society, (2014)A Practical Framework for Preventing Distracted Pedestrian-Related Incidents Using Wrist Wearables., , , , , and . IEEE Access, (2018)Keystroke inference using ambient light sensor on wrist-wearables: a feasibility study., , and . WearSys@MobiSys, page 21-26. ACM, (2018)OverHear: Headphone based Multi-sensor Keystroke Inference., , , and . CoRR, (2023)