Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoD: Dual Denial of Decision Attacks on Human-AI Teams., , , , , , , and . IEEE Pervasive Comput., 22 (1): 77-84 (2023)Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms., and . Proc. Priv. Enhancing Technol., 2020 (2): 358-378 (2020)Who Let theDOGSOut: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening., , , , and . DPM/CBT@ESORICS, volume 12484 of Lecture Notes in Computer Science, page 437-446. Springer, (2020)A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated., , and . CoRR, (2018)Algebraic Attacks on Human Identification Protocols., , , , and . IACR Cryptology ePrint Archive, (2014)Use of cryptography in malware obfuscation., , , , , , and . J. Comput. Virol. Hacking Tech., 20 (1): 135-152 (2024)Stylometric Linkability of Tweets., , , and . WPES, page 205-208. ACM, (2014)The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT., , , , , , , and . CoRR, (2019)Invisible Backdoor Attacks Against Deep Neural Networks., , , , , and . CoRR, (2019)DDoD: Dual Denial of Decision Attacks on Human-AI Teams., , , , , , , and . CoRR, (2022)