Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bisimulation for Demonic Schedulers., , and . FoSSaCS, volume 5504 of Lecture Notes in Computer Science, page 318-332. Springer, (2009)Refinement Orders for Quantitative Information Flow and Differential Privacy., , and . J. Cybersecur. Priv., 1 (1): 40-77 (December 2020)Information Leakage Games: Exploring Information as a Utility Function., , , and . CoRR, (2020)Exact Optimization of Conformal Predictors via Incremental and Decremental Learning., , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 1836-1845. PMLR, (2021)Toward spectrum sharing: opportunities and technical enablers., , , and . IEEE Communications Magazine, 53 (7): 26-33 (2015)Implementing clustering for vehicular ad-hoc networks in ns-3., , and . WNS3, page 25-31. ACM, (2015)F-BLEAU: Fast Black-Box Leakage Estimation., , and . IEEE Symposium on Security and Privacy, page 835-852. IEEE, (2019)Maritime data technology landscape and value chain exploiting oceans of data for maritime applications., , , , , , and . ICE/ITMC, page 1113-1122. IEEE, (2017)A Big Data Driven Approach to Extracting Global Trade Patterns., , and . MATES@VLDB, volume 10731 of Lecture Notes in Computer Science, page 109-121. Springer, (2017)Generating Optimal Privacy-Protection Mechanisms via Machine Learning., , and . CoRR, (2019)