Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asymmetric DCnets for Effective and Efficient Sender Anonymity., , and . GLOBECOM, page 1-7. IEEE, (2018)Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks., , , , and . ARES, page 27:1-27:11. ACM, (2021)Hide And Seek: Detecting Sensors In P2P Botnets, , , , and . IEEE Conference on Communications and Network Security, page 731--732. (2015)AVAIN - a Framework for Automated Vulnerability Indication for the IoT in IP-based Networks., , , and . NetSys, page 1-3. IEEE, (2019)Enhancing Privacy via Hierarchical Federated Learning., , , and . EuroS&P Workshops, page 344-347. IEEE, (2020)Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux., , , and . ACM Conference on Computer and Communications Security, page 2677-2679. ACM, (2019)The Cost of Path Information: Routing in Anonymous Communication., , , and . CCNC, page 1-6. IEEE, (2021)How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes., , , , and . USENIX Security Symposium, page 359-376. USENIX Association, (2022)Efficient privacy-preserving recommendations based on social graphs., , , and . RecSys, page 78-86. ACM, (2019)Label Leakage from Gradients in Distributed Machine Learning., , , and . CCNC, page 1-4. IEEE, (2021)