Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantifying Carbon Emissions due to Online Third-Party Tracking., , , and . CoRR, (2023)"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice., , , , , and . CoRR, (2022)When Sally Met Trackers: Web Tracking From the Users' Perspective., , , and . USENIX Security Symposium, page 2189-2206. USENIX Association, (2022)"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice., , , , , and . SaTML, page 339-364. IEEE, (2023)One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles., , , , and . USENIX Security Symposium, page 5683-5700. USENIX Association, (2023)A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments., , and . ACM Trans. Priv. Secur., 26 (2): 16:1-16:30 (May 2023)SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap., , and . SP, page 1367-1383. IEEE, (2020)"Do Users Fall for Real Adversarial Phishing?" Investigating the Human Response to Evasive Webpages., , , , and . eCrime, page 1-14. IEEE, (2023)Data-driven risk quantification for proactive security. (Quantification du risque basée sur l'analyse des données pour une sécurité proactive).. Sorbonne University, Paris, France, (2021)Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance., , , , , , , and . CCS, page 60-74. ACM, (2023)