Benjamin Kaiser

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Prioritised Unit Propagation by Partitioning the Watch Lists.
Proceedings of the 14th International Workshop on Pragmatics of SAT co-located with the 26th International Conference on Theory and Applications of Satisfiability Testing (SAT 2023), 2023

A Virtual Reality Simulator for Timber Fabrication Tasks Using Industrial Robotic Arms.
Proceedings of the Mensch und Computer 2023, 2023

Co-Design of Structural Timber Components Through Automated Model Generation for Manufacturing Simulation of Reconfigurable Manufacturing Systems.
Proceedings of the 29th International Conference on Mechatronics and Machine Vision in Practice, 2023

2022
Rally and WebScience: A Platform and Toolkit for Browser-Based Research on Technology and Society Problems.
CoRR, 2022

Adversary Safety by Construction in a Language of Cryptographic Protocols.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
Adapting Security Warnings to Counter Online Disinformation.
Proceedings of the 30th USENIX Security Symposium, 2021

Human-Robot Collaborative Workflows for Reconfigurable Fabrication Systems in Timber Prefabrication using Augmented Reality.
Proceedings of the 27th International Conference on Mechatronics and Machine Vision in Practice, 2021

Planning of Curvature-Optimal Smooth Paths for Industrial Robots Using Neural Networks.
Proceedings of the 4th International Conference on Artificial Intelligence for Industries, 2021

2020
Supporting Early and Scalable Discovery of Disinformation Websites.
CoRR, 2020

Blockchain technology: what is it good for?
Commun. ACM, 2020

Identifying Disinformation Websites Using Infrastructure Features.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020

An Empirical Study of Wireless Carrier Authentication for SIM Swaps.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

2019
SoK: Blockchain Technology and Its Potential Use Cases.
CoRR, 2019

Interpolation of CNC Toolpaths using Generative Adversarial Networks.
Proceedings of the Second International Conference on Artificial Intelligence for Industries, 2019

2018
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin.
CoRR, 2018

Camera based path planning for low quantity - high variant manufacturing with industrial robots.
Proceedings of the 25th International Conference on Mechatronics and Machine Vision in Practice, 2018

Generative models for direct generation of CNC toolpaths.
Proceedings of the 25th International Conference on Mechatronics and Machine Vision in Practice, 2018

2017
Environmental Authentication in Malware.
IACR Cryptol. ePrint Arch., 2017

2016
A Formal Framework for Environmentally Sensitive Malware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

2015
Computing on Masked Data to improve the Security of Big Data.
CoRR, 2015


  Loading...