Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A practical secure neighbor verification protocol for wireless sensor networks., , , , and . WISEC, page 193-200. ACM, (2009)Collaborative Location Privacy with Rational Users., , , and . GameSec, volume 7037 of Lecture Notes in Computer Science, page 163-181. Springer, (2011)Membership Inference Attacks Against Adversarially Robust Deep Learning Models., , and . IEEE Symposium on Security and Privacy Workshops, page 50-56. IEEE, (2019)Machine Learning with Membership Privacy using Adversarial Regularization., , and . ACM Conference on Computer and Communications Security, page 634-646. ACM, (2018)Preserving privacy in collaborative filtering through distributed aggregation of offline profiles., , , and . RecSys, page 157-164. ACM, (2009)On the Privacy Risks of Algorithmic Fairness., and . CoRR, (2020)Quantifizierung und Schutz von Location Privacy.. Ausgezeichnete Informatikdissertationen, volume D-14 of LNI, GI, (2013)On the Privacy Risks of Model Explanations., , and . AIES, page 231-241. ACM, (2021)On The Impact of Machine Learning Randomness on Group Fairness., , , and . FAccT, page 1789-1800. ACM, (2023)Anonymous Routing in MANET Using Random Identifiers., , and . ICN, page 2. IEEE Computer Society, (2007)