Get my own profile
Public access
View all15 articles
1 article
available
not available
Based on funding mandates
Co-authors
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Lydia Y. ChenUniversity of Neuchatel/ TU DelftVerified email at ieee.org
Arthur GervaisAssociate Professor (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
Lewis GudgeonImperial College LondonVerified email at imperial.ac.uk
Jiyue HuangDelft University of TechnologyVerified email at tudelft.nl
Hani SalahTU DarmstadtVerified email at cs.tu-darmstadt.de
Zilong ZhaoTU MunichVerified email at tum.de
Aniket KatePurdue UniversityVerified email at purdue.edu
Oğuzhan ErsoyResearch Engineer, GensynVerified email at gensyn.ai
Chris BiemannProfessor for Language Technology, University of HamburgVerified email at informatik.uni-hamburg.de
Karsten WeiheTechnische Universität DarmstadtVerified email at tu-darmstadt.de
Neeraj SuriDistinguished Chair Professor, Lancaster UniversityVerified email at lancaster.ac.uk
Mathias FischerUniversität HamburgVerified email at ieee.org
Giang T. NguyenAssistant Professor | CeTI – Cluster of Excellence | ceti.oneVerified email at tu-dresden.de
rania TALBILIRIS, INSA-LyonVerified email at insa-lyon.fr
Zekeriya ErkinAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Chi HongDelft University of TechnologyVerified email at tudelft.nl
Christian RossowCISPA – Helmholtz Center for Information SecurityVerified email at cispa.saarland
Max MühlhäuserProfessor of Computer Science, Technische Universität DarmstadtVerified email at informatik.tu-darmstadt.de