Author of the publication

Analysis of Privacy Patterns from An Architectural Perspective.

, , , and . ICSA Companion, page 60-67. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Operationalising Responsible AI Using a Pattern-Oriented Approach: A Case Study on Chatbots in Financial Services., , , , , and . CoRR, (2023)The Vulnerabilities of Graph Convolutional Networks: Stronger Attacks and Defensive Techniques., , , , , and . CoRR, (2019)Learning to Infer Counterfactuals: Meta-Learning for Estimating Multiple Imbalanced Treatment Effects., , , , and . CoRR, (2022)Wireframe-based UI Design Search through Image Autoencoder., , , , , , and . ACM Trans. Softw. Eng. Methodol., 29 (3): 19:1-19:31 (2020)Can Software Engineering Harness the Benefits of Advanced AI?, and . IEEE Softw., 39 (6): 99-104 (2022)An empirical study of groupware support for distributed software architecture evaluation process, , , , and . Journal of Systems and Software, 79 (7): 912--925 (July 2006)A Pattern-Oriented Reference Architecture for Governance-Driven Blockchain Systems., , , , and . ICSA, page 23-34. IEEE, (2023)Towards a Taxonomy of Approaches to Modern Complex Systems., , , and . SoSE, page 410-415. IEEE, (2022)A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph., , , , and . ICSE Companion, page 60-63. IEEE, (2023)Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation., , , , , , and . ICSE, page 970-982. IEEE, (2023)