Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Lydia Y. ChenUniversity of Neuchatel/ TU DelftVerified email at ieee.org
Jiyue HuangDelft University of TechnologyVerified email at tudelft.nl
Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
Lewis GudgeonImperial College LondonVerified email at imperial.ac.uk
Hani SalahTU DarmstadtVerified email at cs.tu-darmstadt.de
Zilong ZhaoNational University of SingaporeVerified email at nus.edu.sg
Oğuzhan ErsoyResearch Lead, GensynVerified email at gensyn.ai
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Chris BiemannProfessor for Language Technology, University of HamburgVerified email at informatik.uni-hamburg.de
Karsten WeiheTechnische Universität DarmstadtVerified email at tu-darmstadt.de
Neeraj SuriDistinguished Chair Professor, Lancaster UniversityVerified email at lancaster.ac.uk
Mathias FischerUniversität HamburgVerified email at ieee.org
Chi HongDelft University of TechnologyVerified email at tudelft.nl
Giang T. NguyenAssistant Professor | CeTI – Cluster of Excellence | ceti.oneVerified email at tu-dresden.de
rania TALBILIRIS, INSA-LyonVerified email at insa-lyon.fr
Zekeriya ErkinAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
Lisa EckeyVerified email at crisp-da.de
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de