Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formal Framework for Environmentally Sensitive Malware., , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 211-229. Springer, (2016)Planning of Curvature-Optimal Smooth Paths for Industrial Robots Using Neural Networks., and . AI4I, page 10-15. IEEE, (2021)Human-Robot Collaborative Workflows for Reconfigurable Fabrication Systems in Timber Prefabrication using Augmented Reality., , and . M2VIP, page 576-581. IEEE, (2021)Environmental Authentication in Malware., , , and . LATINCRYPT, volume 11368 of Lecture Notes in Computer Science, page 381-400. Springer, (2017)Camera based path planning for low quantity - high variant manufacturing with industrial robots., , , , and . M2VIP, page 1-6. IEEE, (2018)Co-Design of Structural Timber Components Through Automated Model Generation for Manufacturing Simulation of Reconfigurable Manufacturing Systems., and . M2VIP, page 1-6. IEEE, (2023)Generative models for direct generation of CNC toolpaths., , and . M2VIP, page 1-6. IEEE, (2018)Interpolation of CNC Toolpaths using Generative Adversarial Networks., and . AI4I, page 54-57. IEEE, (2019)A Virtual Reality Simulator for Timber Fabrication Tasks Using Industrial Robotic Arms., , , , and . MuC, page 568-570. ACM, (2023)An Empirical Study of Wireless Carrier Authentication for SIM Swaps., , , and . SOUPS @ USENIX Security Symposium, page 61-79. USENIX Association, (2020)