Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LogPicker: Strengthening Certificate Transparency Against Covert Adversaries., , , , , and . Proc. Priv. Enhancing Technol., 2021 (4): 184-202 (2021)Characterizing knowledge depth in intelligent safety systems., and . Appl. Artif. Intell., 3 (2-3): 129-142 (1989)General Data Protection Runtime: Enforcing Transparent GDPR Compliance for Existing Applications., , , , and . CCS, page 3343-3357. ACM, (2023)Large-scale bioenergy production: how to resolve sustainability trade-offs?, , , , , , , , , and 2 other author(s). Environmental Research Letters, 13 (2): 024011 (2018)Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning., , , , and . USENIX Security Symposium, page 1363-1380. USENIX Association, (2020)Algorithmic Programming Language Identification, , and . CoRR, (2011)Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications., , , and . CCS, page 3576-3578. ACM, (2023)Global energy sector emission reductions and bioenergy use: overview of the bioenergy demand phase of the EMF-33 model comparison, , , , , , , , , and 13 other author(s). Climatic Change, (July 2018)Legendre Expansions of Products of Functions with Applications to Nonlinear Partial Differential Equations., , and . CoRR, (2021)Talking About My Generation: Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow Analysis., , , and . EuroSec@EuroSys, page 27-33. ACM, (2021)