Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jan BorchersProfessor of Computer Science, RWTH Aachen UniversityVerified email at cs.rwth-aachen.de
Simon VoelkerResearcher, RWTH Aachen UniversityVerified email at cs.rwth-aachen.de
Florian HellerFH Aachen University of Applied SciencesVerified email at fh-aachen.de
Florian EchtlerAssociate Professor for Computer Science, Aalborg UniversityVerified email at cs.aau.dk
Steve HarozCognitive ScientistVerified email at inria.fr
Malte WeissRWTH Aachen UniversityVerified email at cs.rwth-aachen.deMatthew KayAssociate Professor, Northwestern UniversityVerified email at northwestern.edu
Chia-Kai YangUniversity of ZurichVerified email at ifi.uzh.ch
Alexander EiselmayerPhD Student, University of ZurichVerified email at ifi.uzh.ch
Wendy E. MackayInria, LISN, Université Paris-SaclayVerified email at lri.fr
Krishna SubramanianPh.D. Candidate, RWTH Aachen UniversityVerified email at cs.rwth-aachen.de
Mauro CherubiniUniversity of LausanneVerified email at unil.ch
Kavous Salehzadeh Niksirat, PhDMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Sadiq AliyuUniversity of LausanneVerified email at unil.ch
Michel Beaudouin-LafonUniversité Paris-SaclayVerified email at universite-paris-saclay.fr
Pierre DragicevicInriaVerified email at inria.fr
Shion GuhaUniversity of TorontoVerified email at utoronto.ca
Helen Ai HeAssistant Professor, Computer Science, University of CalgaryVerified email at ucalgary.ca
Andrea B. HornUniversity of ZuerichVerified email at psychologie.uzh.ch
Naomi YamashitaKyoto UniversityVerified email at acm.org