Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Brokered Agreements in Multi-Party Machine Learning., and . APSys, page 69-75. ACM, (2019)Biscotti: A Blockchain System for Private and Secure Federated Learning., , , and . IEEE Trans. Parallel Distributed Syst., 32 (7): 1513-1525 (2021)Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems., , , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 493-513. Springer, (2022)BPG: Seamless, automated and interactive visualization of scientific data., , , , , , , , , and 29 other author(s). BMC Bioinform., 20 (1): 42:1-42:5 (2019)Erratum to: A bedr way of genomic interval processing., , , , , and . Source Code for Biology and Medicine, 12 (1): 1 (2017)The Limitations of Federated Learning in Sybil Settings., , and . RAID, page 301-316. USENIX Association, (2020)Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting., , , and . CoRR, (2018)Biscotti: A Ledger for Private and Secure Peer-to-Peer Machine Learning., , , and . CoRR, (2018)A bedr way of genomic interval processing., , , , , and . Source Code Biol. Medicine, 11 (1): 14 (2016)Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning., , , and . WWW, page 2684-2695. ACM / IW3C2, (2021)