Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy and security challenges in the smart grid user domain.. IH&MMSec, page 85-86. ACM, (2013)Influence of data granularity on nonintrusive appliance load monitoring., and . IH&MMSec, page 147-151. ACM, (2014)An analysis of privacy preservation in electric vehicle charging., , , , , and . Energy Inform., (2022)Differentiable Electron Microscopy Simulation: Methods and Applications for Visualization., , , , , , and . CoRR, (2022)Spatially Guiding Unsupervised Semantic Segmentation Through Depth-Informed Feature Distillation and Sampling., , , and . CoRR, (2023)Leveraging Self-Supervised Vision Transformers for Neural Transfer Function Design., , and . CoRR, (2023)Off-chain state channels in the energy domain., , , and . ISGT, page 1-5. IEEE, (2021)DID and VC: Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust., , , , and . ICBTA, page 61-66. ACM, (2020)The role of user interaction and acceptance in a cloud-based demand response model., , and . IECON, page 4797-4802. IEEE, (2013)Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption., and . MM&Sec, page 63-70. ACM, (2005)