David Klein

Orcid: 0000-0001-8468-8516

According to our database1, David Klein authored at least 23 papers between 1987 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

General Data Protection Runtime: Enforcing Transparent GDPR Compliance for Existing Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Accept All Exploits: Exploring the Security Impact of Cookie Banners.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
LogPicker: Strengthening Certificate Transparency Against Covert Adversaries.
Proc. Priv. Enhancing Technol., 2021

Legendre Expansions of Products of Functions with Applications to Nonlinear Partial Differential Equations.
CoRR, 2021

Talking About My Generation: Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow Analysis.
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021

2020
Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning.
Proceedings of the 29th USENIX Security Symposium, 2020

2018
A methodology and implementation of automated emissions harmonization for use in Integrated Assessment Models.
Environ. Model. Softw., 2018

2017
CanTouchThis: Examining the Effect of Physical Contact in a Mobile Multiplayer Game.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Konzerninternes Outsourcing von E-Mail- und anderen Unternehmenskommunikationsdiensten.
Comput. und Recht, 2016

Deploying Contextual Computing in a Campus Setting.
Proceedings of the Eleventh International Network Conference, 2016

Bool the Miner: Relying on Ghost Companions to Solve Boolean Equations.
Proceedings of the 2016 Annual Symposium on Computer-Human Interaction in Play, 2016

2013
Implementing Situation Awareness for Car-to-X Applications Using Domain Specific Languages.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

2012
Improving Cancer Screening Among Underserved Populations using Mobile Phones and Tablets for Patients and Navigators.
Proceedings of the AMIA 2012, 2012

2011
Algorithmic Programming Language Identification
CoRR, 2011

2005
Context of Use Evaluation of Peripheral Displays (CUEPD).
Proceedings of the Human-Computer Interaction, 2005

2003
Ada: a Playful Interactive Space.
Proceedings of the Human-Computer Interaction INTERACT '03: IFIP TC13 International Conference on Human-Computer Interaction, 2003

Ada -intelligent space: an artificial creature for the swiss Expo.02.
Proceedings of the 2003 IEEE International Conference on Robotics and Automation, 2003

2002
Ada: constructing a synthetic organism.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Lausanne, Switzerland, September 30, 2002

1992
The Kobayashi Metric of a Complex Ellipsoid in C<sup>2</sup>.
Exp. Math., 1992

1989
Characterizing knowledge depth in intelligent safety systems.
Appl. Artif. Intell., 1989

1987
What's in a Deep Model? A Characterization of Knowledge Depth in Intelligent Safety Systems.
Proceedings of the 10th International Joint Conference on Artificial Intelligence. Milan, 1987


  Loading...