Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource-Aware Asynchronous Online Federated Learning for Nonlinear Regression., , , , and . CoRR, (2021)Uncovering access control weaknesses and flaws with security-discordant software clones., , and . ACSAC, page 209-218. ACM, (2013)Experience: Model-Based, Feedback-Driven, Greybox Web Fuzzing with BackREST., , , , , and . ECOOP, volume 222 of LIPIcs, page 29:1-29:30. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications., and . SCAM, page 44-53. IEEE Computer Society, (2012)Supporting Maintenance and Evolution of Access Control Models in Web Applications., , , and . ICSME, page 506-510. IEEE Computer Society, (2014)BackREST: A Model-Based Feedback-Driven Greybox Fuzzer for Web Applications., , , , , and . CoRR, (2021)Personalized Graph Federated Learning with Differential Privacy., , , , and . CoRR, (2023)Personalized Online Federated Learning for IoT/CPS: Challenges and Future Directions., , , , and . IEEE Internet Things Mag., 5 (4): 78-84 (2022)Resource-Aware Asynchronous Online Federated Learning for Nonlinear Regression., , , , and . ICC, page 2828-2833. IEEE, (2022)Extraction and comprehension of moodle's access control model: A case study., , , and . PST, page 44-51. IEEE, (2011)