Author of the publication

User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.

, , , , , and . EuroS&P, page 323-337. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance study of inter-vehicle information dissemination using long range wireless system for assisting congestion resolution at sags., and . VNC, page 247-250. IEEE, (2017)Characterizing Promotional Attacks in Mobile App Store., , , , and . ATIS, volume 719 of Communications in Computer and Information Science, page 113-127. Springer, (2017)Fraglight: shedding light on broken pointcuts in evolving aspect-oriented software., , , and . SPLASH (Companion Volume), page 17-18. ACM, (2015)Location Management Method for Students on Campus Using Smartphones for Health and Safety., , , and . NBiS, volume 526 of Lecture Notes in Networks and Systems, page 238-247. Springer, (2022)Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services., , , , and . J. Inf. Process., (2020)Docking Simulation of Chemerin-9 and ChemR23 Receptor., , , , , and . ICBBB, page 22-27. ACM, (2020)Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N)., , , and . ASE, page 641-646. IEEE Computer Society, (2015)Poster: A First Look at the Privacy Risks of Voice Assistant Apps., , , , , and . CCS, page 2633-2635. ACM, (2019)Programmable Aperture Camera Using LCoS., , , , and . ECCV (6), volume 6316 of Lecture Notes in Computer Science, page 337-350. Springer, (2010)Real-time P and R wave detection in exercise electrocardiogram., , and . WSTST, volume 29 of Advances in Soft Computing, page 591-603. Springer, (2005)