From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hidden Voice Commands., , , , , , , и . USENIX Security Symposium, стр. 513-530. USENIX Association, (2016)Whisper: a unilateral defense against VoIP traffic re-identification attacks., , и . ACSAC, стр. 286-296. ACM, (2019)Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor., , и . USENIX Security Symposium, стр. 1823-1840. USENIX Association, (2019)You Talk Too Much: Limiting Privacy Exposure Via Voice Input., и . IEEE Symposium on Security and Privacy Workshops, стр. 84-91. IEEE, (2019)Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility., , , и . CHI, стр. 525. ACM, (2019)Where art thou, Eve? Experiences laying traps for Internet eavesdroppers., , , и . CSET @ USENIX Security Symposium, USENIX Association, (2017)Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)., и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 91-104. Springer, (2015)Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones., и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 80-90. Springer, (2015)Ephemeral Exit Bridges for Tor., , , , и . DSN, стр. 253-265. IEEE, (2020)An Extensive Evaluation of the Internet's Open Proxies., , , и . ACSAC, стр. 252-265. ACM, (2018)