Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digitization Diffusion Along the Supply Chain., , and . ICIS, Association for Information Systems, (2020)Data-adaptive M-estimators for robust regression via bi-level optimization., , , and . Signal Process., (2023)The Business Value of Engaging in Counter-Breach Initiatives., , and . AMCIS, Association for Information Systems, (2018)Psychological Contract Violation and Sharing Intention on Facebook., , , and . HICSS, page 1-10. ScholarSpace, (2019)ICASSP-SPGC 2022: Root Cause Analysis for Wireless Network Fault Localization., , , , , , , and . ICASSP, page 9301-9305. IEEE, (2022)Does Cybersecurity Slow Down Digitization? A Quasi-experiment of Security Breach Notification Laws., , and . ICIS, Association for Information Systems, (2019)A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network., , , , , and . IEEE Trans. Multim., (2023)Fast Generic Interaction Detection for Model Interpretability and Compression., , and . ICLR, OpenReview.net, (2022)An Interpretable and Sample Efficient Deep Kernel for Gaussian Process., , , , , and . UAI, volume 124 of Proceedings of Machine Learning Research, page 759-768. AUAI Press, (2020)