Author of the publication

Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion).

. Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 157-170. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making Bitcoin Legal (Transcript of Discussion).. Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 254-265. Springer, (2018)Making Bitcoin Legal., , and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 243-253. Springer, (2018)To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression., , , and . CoRR, (2018)Strong Mixed-Integer Programming Formulations for Trained Neural Networks., , , and . IPCO, volume 11480 of Lecture Notes in Computer Science, page 27-42. Springer, (2019)Bugs in our Pockets: The Risks of Client-Side Scanning, , , , , , , , , and 4 other author(s). (Oct 14, 2021)Security Engineering. John Wiley & Sons, Hoboken, New Jersey, (2008)Privacy versus government surveillance: where network effects meet public choice. (2014)Strong mixed-integer programming formulations for trained neural networks., , , and . CoRR, (2018)Strong convex relaxations and mixed-integer programming formulations for trained neural networks, , , and . (2018)cite arxiv:1811.01988.Using a Bayesian model for confidence to make decisions that consider epistemic regret., , and . FUSION, page 264-269. IEEE, (2016)