Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Common Evaluation Pitfalls in Touch-Based Authentication Systems., , , , and . AsiaCCS, page 1049-1063. ACM, (2022)Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating., , and . CoRR, (2019)SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations., , , , and . CoRR, (2020)SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations., , , , and . USENIX Security Symposium, page 1865-1882. USENIX Association, (2021)It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features., , , , and . WIFS, page 1-6. IEEE, (2017)I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy., , , and . CoRR, (2022)Generating identities with mixture models for speaker anonymization., , and . Comput. Speech Lang., (2022)Seeing Red: PPG Biometrics Using Smartphone Cameras., , , and . CVPR Workshops, page 3565-3574. Computer Vision Foundation / IEEE, (2020)Widen The Backdoor To Let More Attackers In., , , and . CoRR, (2021)Continuous-Time Temporal Graph Learning on Provenance Graphs., , , , and . ICDM (Workshops), page 1131-1140. IEEE, (2023)