Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Various Discriminatory Features for Eye Detection., and . Cross Disciplinary Biometric Systems, volume 37 of Intelligent Systems Reference Library, Springer, (2012)GANSynth: Adversarial Neural Audio Synthesis., , , , , and . ICLR (Poster), OpenReview.net, (2019)An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism., , and . ACM Conference on Computer and Communications Security, page 2-11. ACM, (2007)Real-time dynamic Pricing for multiproduct models with time-dependent customer arrival rates., and . ACC, page 2196-2201. IEEE, (2009)Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation., , , and . SP, page 1525-1539. IEEE, (2022)Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities., , , , , , and . NDSS, The Internet Society, (2006)Feature Fusion in Deep-Learning Semantic Image Segmentation: A Survey., , and . SmartCity360°, volume 442 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 284-292. Springer, (2021)Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?, , , , and . ACSAC, page 596-608. ACM, (2021)Approximately Learning Quantum Automata., , , and . TASE, volume 13931 of Lecture Notes in Computer Science, page 268-285. Springer, (2023)OAuth Demystified for Mobile Application Developers., , , , , and . CCS, page 892-903. ACM, (2014)