Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Lydia Y. ChenUniversity of Neuchatel/ TU DelftVerified email at ieee.org
Jiyue HuangDelft University of TechnologyVerified email at tudelft.nl
Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
Lewis GudgeonImperial College LondonVerified email at imperial.ac.uk
Zilong ZhaoNational University of SingaporeVerified email at nus.edu.sg
Hani SalahTU DarmstadtVerified email at cs.tu-darmstadt.de
Oğuzhan ErsoyResearch Lead, GensynVerified email at gensyn.ai
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Chi HongDelft University of TechnologyVerified email at tudelft.nl
Chris BiemannProfessor for Language Technology, University of HamburgVerified email at informatik.uni-hamburg.de
Karsten WeiheTechnische Universität DarmstadtVerified email at tu-darmstadt.de
Neeraj SuriDistinguished Chair Professor, Lancaster UniversityVerified email at lancaster.ac.uk
Giang T. NguyenAssistant Professor | CeTI – Cluster of Excellence | ceti.oneVerified email at tu-dresden.de
Mathias FischerUniversität HamburgVerified email at ieee.org
Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Ben WeintraubPhD Candidate, Northeastern UniversityVerified email at northeastern.edu
Dick EpemaProfessor of Computer Science, Delft University of TechnologyVerified email at tudelft.nl