Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SeePrivacy: Automated Contextual Privacy Policy Generation for Mobile Applications., , , , , , , and . CoRR, (2023)Right to be Forgotten in the Era of Large Language Models: Implications, Challenges, and Solutions., , , , , , and . CoRR, (2023)A Large-scale Empirical Study of Online Automated Privacy Policy Generators for Mobile Apps., , , , , , and . CoRR, (2023)Navigating Privacy and Copyright Challenges Across the Data Lifecycle of Generative AI., , , , , , , , and . CoRR, (2023)Trust in Software Supply Chains: Blockchain-Enabled SBOM and the AIBOM Future., , , , , and . CoRR, (2023)To Be Forgotten or To Be Fair: Unveiling Fairness Implications of Machine Unlearning Methods., , , , , , , , and . CoRR, (2023)A Process Adaptation Framework for Blockchain-Based Supply Chain Management., , , and . IEEE ICBC, page 1-9. IEEE, (2021)Understanding and Handling Blockchain Uncertainties., , , , and . ICBC, volume 12404 of Lecture Notes in Computer Science, page 108-124. Springer, (2020)Toward the Cure of Privacy Policy Reading Phobia: Automated Generation of Privacy Nutrition Labels From Privacy Policies., , , , , , and . CoRR, (2023)Test-takers have a say: understanding the implications of the use of AI in language tests., , , , , , , , and . CoRR, (2023)