Get my own profile
Public access
View all17 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Lydia Y. ChenUniversity of Neuchatel/ TU DelftVerified email at ieee.org
Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Jiyue HuangDelft University of TechnologyVerified email at tudelft.nl
Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
Lewis GudgeonImperial College LondonVerified email at imperial.ac.uk
Zilong ZhaoNational University of Singapore & BetterdataVerified email at nus.edu.sg
Chi HongDelft University of TechnologyVerified email at tudelft.nl
Oğuzhan ErsoyResearch Lead, GensynVerified email at gensyn.ai
Hani SalahTU DarmstadtVerified email at cs.tu-darmstadt.deAniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Dick EpemaProfessor of Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Chris BiemannProfessor for Language Technology, University of HamburgVerified email at informatik.uni-hamburg.de
Karsten WeiheTechnische Universität DarmstadtVerified email at tu-darmstadt.deNeeraj SuriDistinguished Chair Professor, Lancaster UniversityVerified email at lancaster.ac.uk
Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Ben WeintraubPostdoctoral Research Associate, Northeastern UniversityVerified email at northeastern.edu
Giang T. NguyenAssistant Professor | CeTI – Cluster of Excellence | ceti.oneVerified email at tu-dresden.de
Mathias FischerUniversität HamburgVerified email at ieee.org