Author of the publication

PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid.

, , , , , and . IEEE Trans. Industrial Informatics, 14 (8): 3733-3744 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Benjamin Stamm University of Stuttgart

Replication Data for: "Numerical simulation of the Gross-Pitaevskii equation via vortex tracking", , , and . Software, (2024)Related to: T. Carvalho Corso, G. Kemlin, C. Melcher and B. Stamm. Numerical simulation of the Gross-Pitaevskii equation via vortex tracking. Preprint (2024). arXiv: 2404.02133.
Replication Data for: "Numerical simulation of the Gross-Pitaevskii equation via vortex tracking", , , and . Software, (2024)Related to: T. Carvalho Corso, G. Kemlin, C. Melcher and B. Stamm. Numerical simulation of the Gross-Pitaevskii equation via vortex tracking. Preprint (2024). arXiv: 2404.02133.ddX: Polarizable Continuum Solvation from Small Molecules to Proteins, , , , , and . (March 2024)
 

Other publications of authors with the same name

A Geometric Approach to Sample Compression., and . J. Mach. Learn. Res., (2012)MOOCs Meet Measurement Theory: A Topic-Modelling Approach., , , , , and . CoRR, (2015)Exploiting Machine Learning to Subvert Your Spam Filter., , , , , , , , and . LEET, USENIX Association, (2008)In Search of an Entity Resolution OASIS: Optimal Asymptotic Sequential Importance Sampling., and . PVLDB, 10 (11): 1322-1333 (2017)TopicResponse: A Marriage of Topic Modelling and Rasch Modelling for Automatic Measurement in MOOCs., , , , and . CoRR, (2016)A Learning-Based Approach to Reactive Security., , , , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 192-206. Springer, (2010)Robust and Private Bayesian Inference., , , and . ALT, volume 8776 of Lecture Notes in Computer Science, page 291-305. Springer, (2014)Near-Optimal Evasion of Convex-Inducing Classifiers., , , , , , , , and . AISTATS, volume 9 of JMLR Proceedings, page 549-556. JMLR.org, (2010)Open problems in the security of learning., , , , , , , and . AISec, page 19-26. ACM, (2008)Adversarial machine learning., , , , and . AISec, page 43-58. ACM, (2011)