From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks., , , , и . CoRR, (2023)Breaking! A Typology of Security and Privacy News and How It's Shared., , , и . CHI, стр. 1. ACM, (2018)Blind and Human: Exploring More Usable Audio CAPTCHA Designs., , , , и . SOUPS @ USENIX Security Symposium, стр. 111-125. USENIX Association, (2020)WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments., , , , , и . SOUPS @ USENIX Security Symposium, стр. 281-298. USENIX Association, (2021)Exploring capturable everyday memory for autobiographical authentication., , и . UbiComp, стр. 211-220. ACM, (2013)"It's a Fair Game", or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents., , , , , , , и . CHI, стр. 156:1-156:26. ACM, (2024)Granular Privacy Control for Geolocation with Vision Language Models., , , , , и . CoRR, (2024)Iterative Design of An Accessible Crypto Wallet for Blind Users., , , , и . SOUPS, стр. 381-398. USENIX Association, (2023)ACCessory: password inference using accelerometers on smartphones., , , , и . HotMobile, стр. 9. ACM, (2012)Emotion Recognition from Facial Expression and Electroencephalographic Signals Using Vector Quantization and Support Vector Machines., , , , , и . IC-AI, стр. 710-715. CSREA Press, (2010)