Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive Anonymization for Privacy aware Machine Learning., , and . IAL@PKDD/ECML, volume 1924 of CEUR Workshop Proceedings, page 15-26. CEUR-WS.org, (2017)SoK: Automatic Deobfuscation of Virtualization-protected Applications., , , , and . ARES, page 6:1-6:15. ACM, (2021)Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications., , , , , , and . NDSS, The Internet Society, (2012)Assessing the sovereignty and security of the Austrian internet., , and . ICSSA, page 15-25. IEEE, (2020)Privacy by Design Data Exchange Between CSIRTs., , and . APF, volume 10518 of Lecture Notes in Computer Science, page 104-119. Springer, (2017)A tamper-proof audit and control system for the doctor in the loop., , , , and . Brain Informatics, 3 (4): 269-279 (2016)Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI., , , and . CD-MAKE, volume 11015 of Lecture Notes in Computer Science, page 1-8. Springer, (2018)Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI., , , and . CD-MAKE, volume 12844 of Lecture Notes in Computer Science, page 1-20. Springer, (2021)Machine Learning and Knowledge Extraction to Support Work Safety for Smart Forest Operations., , , , , , , , , and . CD-MAKE, volume 13480 of Lecture Notes in Computer Science, page 362-375. Springer, (2022)Real-Time Forensics Through Endpoint Visibility., , , , and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 18-32. Springer, (2017)