“Addressing the Address Books’ (Interdependent) Privacy Issues” accepted at USENIX security’25 Post date 29 October 2025
“Link Stealing Attacks Against Inductive Graph Neural Networks” accepted at PETS’24 Post date 29 October 2025
“Shadow Health-Related Data: Definition, Categorization, and User Perspectives” accepted at EuroUSEC 24 Post date 29 October 2025
“Security and Privacy with Second-Hand Storage Devices: A User-Centric Perspective from Switzerland” accepted at PETS’24 Post date 12 April 2024
“Wearable Activity Trackers: A Survey on Utility, Privacy, and Security” accepted in the ACM Computing Surveys Post date 12 April 2024
“Quantifying Privacy Risks of Prompts in Visual Prompt Learning” accepted at USENIX Security’24 Post date 12 April 2024
“Prioritizing Investments in Cybersecurity: Empirical Evidence from an Event Study on the Determinants of Cyberattack Costs” accepted at WEIS’24 Post date 12 April 2024
“Shorts vs. Regular Videos on YouTube: A Comparative Analysis of User Engagement and Content Creation Trends” accepted at WebSci’24 Post date 5 April 2024