Get my own profile
Public access
View all35 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jilles VreekenCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Luc De Raedtprofessor, KU Leuven & guestprofessor, Örebro UniversityVerified email at cs.kuleuven.be
Siegfried NijssenICTEAM, EPL, Université catholique de Louvain; Universiteit LeidenVerified email at uclouvain.be
Thomas BäckProfessor of Computer Science, Leiden University; Chief Scientist, NORCE Research Centre, NorwayVerified email at liacs.leidenuniv.nl
Antti UkkonenSpeechly & University of HelsinkiVerified email at helsinki.fi
Vladimir DzyubaFaktionVerified email at faktion.com
Thanh Le VanJanssen Pharmaceutica NV - Johnson and JohnsonVerified email at its.jnj.com
Hugo ProençaBooking.comVerified email at liacs.leidenuniv.nl
Arno KnobbeLIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Francesco BonchiResearch Director at CentaiVerified email at centai.eu
Tijl De BieFull Professor, Ghent UniversityVerified email at ugent.be
Marieke VinkenoogPhD Data Science, Leiden University & Sanquin ResearchVerified email at sanquin.nl
Sander van RijnPhD Student LIACSVerified email at liacs.leidenuniv.nl
Lincen YangPhD candidate in Computer Science, Leiden UniversityVerified email at liacs.leidenuniv.nl
Lieven VerbekeCentrica Business SolutionsVerified email at centrica.com
Jimmy Van den EyndenAssistant professor at Ghent UniversityVerified email at ugent.be
Dries De MaeyerVerified email at its.jnj.com
Peter GrünwaldGroup Leader Machine Learning, CWI; Professor of Statistics, Leiden UniversityVerified email at cwi.nl
Hao WangAssistant Professor in Leiden UniversityVerified email at liacs.leidenuniv.nl
Niki van SteinLeiden UniversityVerified email at liacs.leidenuniv.nl
Follow
Matthijs van Leeuwen
Associate Professor, Leiden University
Verified email at liacs.leidenuniv.nl - Homepage