Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AnonySense: A system for anonymous opportunistic sensing., , , , , and . Pervasive and Mobile Computing, 7 (1): 16-30 (2011)Adaptive Security and Privacy for mHealth Sensing., , , , and . HealthSec, USENIX Association, (2011)DEAMON: Energy-efficient Sensor Monitoring., , , and . SECON, page 1-9. IEEE, (2009)The Efficacy of SHIELD under Different Threat Models.. CoRR, (2019)Talk Proposal: Towards the Realistic Evaluation of Evasion Attacks using CARLA., , , and . CoRR, (2019)ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector., , , and . ECML/PKDD (1), volume 11051 of Lecture Notes in Computer Science, page 52-68. Springer, (2018)Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth., , , , and . MONET, 19 (3): 331-344 (2014)Who Wears Me? Bioimpedance as a Passive Biometric., , , , , and . HealthSec, USENIX Association, (2012)Recognizing Whether Sensors Are on the Same Body., and . Pervasive, volume 6696 of Lecture Notes in Computer Science, page 332-349. Springer, (2011)Darwin phones: the evolution of sensing and inference on mobile phones., , , , , and . MobiSys, page 5-20. ACM, (2010)