default search action
Benjamin Kaiser
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c14]Benjamin Kaiser, Alexander Verl:
Co-Design of Structural Timber Components Through Automated Model Generation for Manufacturing Simulation of Reconfigurable Manufacturing Systems. M2VIP 2023: 1-6 - [c13]Eric Bossecker
, Aimée Sousa Calepso
, Benjamin Kaiser
, Alexander Verl
, Michael Sedlmair
:
A Virtual Reality Simulator for Timber Fabrication Tasks Using Industrial Robotic Arms. MuC 2023: 568-570 - [c12]Benjamin Kaiser, Robert Clausecker, Michael Mavroskoufis:
Prioritised Unit Propagation by Partitioning the Watch Lists. POS@SAT 2023: 14-34 - 2022
- [c11]Timothy M. Braje, Alice R. Lee, Andrew Wagner
, Benjamin Kaiser, Daniel Park, Martine Kalke, Robert K. Cunningham, Adam Chlipala:
Adversary Safety by Construction in a Language of Cryptographic Protocols. CSF 2022: 412-427 - [i7]Anne Kohlbrenner, Ben Kaiser, Kartikeya Kandula, Rebecca Weiss, Jonathan R. Mayer, Ted Han, Robert Helmer:
Rally and WebScience: A Platform and Toolkit for Browser-Based Research on Technology and Society Problems. CoRR abs/2211.02274 (2022) - 2021
- [c10]Benjamin Kaiser, Alexander Verl:
Planning of Curvature-Optimal Smooth Paths for Industrial Robots Using Neural Networks. AI4I 2021: 10-15 - [c9]Benjamin Kaiser, Tim Strobel
, Alexander Verl:
Human-Robot Collaborative Workflows for Reconfigurable Fabrication Systems in Timber Prefabrication using Augmented Reality. M2VIP 2021: 576-581 - [c8]Ben Kaiser, Jerry Wei, Eli Lucherini, Kevin Lee, J. Nathan Matias, Jonathan R. Mayer:
Adapting Security Warnings to Counter Online Disinformation. USENIX Security Symposium 2021: 1163-1180 - 2020
- [j2]Scott Ruoti
, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
Blockchain technology: what is it good for? Commun. ACM 63(1): 46-53 (2020) - [c7]Kevin Lee, Benjamin Kaiser, Jonathan R. Mayer, Arvind Narayanan:
An Empirical Study of Wireless Carrier Authentication for SIM Swaps. SOUPS @ USENIX Security Symposium 2020: 61-79 - [c6]Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan R. Mayer:
Identifying Disinformation Websites Using Infrastructure Features. FOCI @ USENIX Security Symposium 2020 - [i6]Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan R. Mayer:
Supporting Early and Scalable Discovery of Disinformation Websites. CoRR abs/2003.07684 (2020) - [i5]Ben Kaiser, Jerry Wei, Elena Lucherini, Kevin Lee, J. Nathan Matias, Jonathan R. Mayer:
Adapting Security Warnings to Counter Online Disinformation. CoRR abs/2008.10772 (2020)
2010 – 2019
- 2019
- [j1]Scott Ruoti
, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
Blockchain Technology: What Is It Good for? ACM Queue 17(5): 41-68 (2019) - [c5]Benjamin Kaiser, Alexander Verl:
Interpolation of CNC Toolpaths using Generative Adversarial Networks. AI4I 2019: 54-57 - [i4]Scott Ruoti, Benjamin Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
SoK: Blockchain Technology and Its Potential Use Cases. CoRR abs/1909.12454 (2019) - 2018
- [c4]Benjamin Kaiser, Akos Csiszar, Alexander Verl:
Generative models for direct generation of CNC toolpaths. M2VIP 2018: 1-6 - [c3]Peter Weßeler, Benjamin Kaiser, Jürgen te Vrugt, Armin Lechler, Alexander Verl:
Camera based path planning for low quantity - high variant manufacturing with industrial robots. M2VIP 2018: 1-6 - [i3]Ben Kaiser, Mireya Jurado, Alex Ledger:
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin. CoRR abs/1810.02466 (2018) - 2017
- [c2]Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller
, Bülent Yener:
Environmental Authentication in Malware. LATINCRYPT 2017: 381-400 - [i2]Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bülent Yener:
Environmental Authentication in Malware. IACR Cryptol. ePrint Arch. 2017: 928 (2017) - 2016
- [c1]Jeremy Blackthorne, Benjamin Kaiser, Bülent Yener:
A Formal Framework for Environmentally Sensitive Malware. RAID 2016: 211-229 - 2015
- [i1]Vijay Gadepally, Braden Hancock, Benjamin Kaiser, Jeremy Kepner, Peter Michaleas, Mayank Varia, Arkady Yerukhimovich:
Computing on Masked Data to improve the Security of Big Data. CoRR abs/1504.01287 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 00:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint