Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tag Your Fish in the Broken Net: A Responsible Web Framework for Protecting Online Privacy and Copyright., , , , , , , , and . CoRR, (2023)IoT-CCAC: a blockchain-based consortium capability access control approach for IoT., , , , and . PeerJ Comput. Sci., (2021)On the Way to SBOMs: Investigating Design Issues and Solutions in Practice., , , , and . CoRR, (2023)Navigating Privacy and Copyright Challenges Across the Data Lifecycle of Generative AI., , , , , , , , and . CoRR, (2023)Trust in Software Supply Chains: Blockchain-Enabled SBOM and the AIBOM Future., , , , , and . CoRR, (2023)Towards Concrete and Connected AI Risk Assessment (C2AIRA): A Systematic Mapping Study., , , , , , and . CAIN, page 104-116. IEEE, (2023)An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead., , , , and . ICSE, page 2630-2642. IEEE, (2023)A Survey on AI Risk Assessment Frameworks., , , , , , and . CoRR, (2023)Recent Research on AI in Games., , and . IWCMC, page 505-510. IEEE, (2020)From Principles to Practice: An Accountability Metrics Catalogue for Managing AI Risks., , , , , and . CoRR, (2023)