Tim Grube
Tim Grube
Unknown affiliation
Verified email at
Cited by
Cited by
User-level label leakage from gradients in federated learning
A Wainakh, F Ventola, T Müßig, J Keim, CG Cordero, E Zimmer, T Grube, ...
arXiv preprint arXiv:2105.09369, 2021
What the fog? edge computing revisited: Promises, applications and future challenges
J Gedeon, F Brandherm, R Egert, T Grube, M Mühlhäuser
IEEE Access 7, 152847-152878, 2019
Enhancing privacy via hierarchical federated learning
A Wainakh, AS Guinea, T Grube, M Mühlhäuser
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
AnonPubSub: Anonymous publish-subscribe overlays
J Daubert, M Fischer, T Grube, S Schiffner, P Kikiras, M Mühlhäuser
Computer Communications 76, 42-53, 2016
Investigating usability and user experience of individually verifiable internet voting schemes
K Marky, ML Zollinger, P Roenne, PYA Ryan, T Grube, K Kunze
ACM Transactions on Computer-Human Interaction (TOCHI) 28 (5), 1-36, 2021
Label leakage from gradients in distributed machine learning
A Wainakh, T Müßig, T Grube, M Mühlhäuser
2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021
Efficient privacy-preserving recommendations based on social graphs
A Wainakh, T Grube, J Daubert, M Mühlhäuser
Proceedings of the 13th ACM Conference on Recommender Systems, 78-86, 2019
Sensorbuster: On identifying sensor nodes in p2p botnets
S Karuppayah, L Böck, T Grube, S Manickam, M Mühlhäuser, M Fischer
Proceedings of the 12th International Conference on Availability …, 2017
How Long Do Vulnerabilities Live in the Code? A {Large-Scale} Empirical Measurement Study on {FOSS} Vulnerability Lifetimes
N Alexopoulos, M Brack, JP Wagner, T Grube, M Mühlhäuser
31st USENIX Security Symposium (USENIX Security 22), 359-376, 2022
Cover traffic: A trade of anonymity and efficiency
T Grube, M Thummerer, J Daubert, M Mühlhäuser
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
Hide and seek: detecting sensors in P2P botnets
L Böck, S Karuppayah, T Grube, M Mühlhäuser, M Fischer
2015 IEEE Conference on Communications and Network Security (CNS), 731-732, 2015
A formal holon model for operating future energy grids during blackouts
S Valipour, F Volk, T Grube, L Böck, L Karg, M Mühlhäuser
2016 5th International Conference on Smart Cities and Green ICT Systems …, 2016
Internal attacks in anonymous publish-subscribe P2P overlays
J Daubert, T Grube, M Mühlhäuser, M Fischer
2015 International Conference and Workshops on Networked Systems (NetSys), 1-8, 2015
Tweet beyond the cage: a hybrid solution for the privacy dilemma in online social networks
A Wainakh, T Grube, J Daubert, C Porth, M Muhlhauser
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
{P} Net: Privacy-preserving personalization of AI-based models by anonymous inter-person similarity networks
C Meurisch, S Kauschke, T Grube, B Bayrak, M Mühlhäuser
Proceedings of the 16th EAI International Conference on Mobile and …, 2019
Federated learning attacks revisited: A critical discussion of gaps, assumptions, and evaluation setups
A Wainakh, E Zimmer, S Subedi, J Keim, T Grube, S Karuppayah, ...
Sensors 23 (1), 31, 2022
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration
T Grube, F Volk, M Mühlhäuser, S Bhairav, V Sachidananda, Y Elovici
10th International Conference on Advances in Human-oriented and Personalized …, 2017
Poster: Towards automated quantitative analysis and forecasting of vulnerability discoveries in debian GNU/Linux
N Alexopoulos, R Egert, T Grube, M Mühlhäuser
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Ant colony optimisation—A solution to efficient anonymous group communication?
T Grube, S Hauke, J Daubert, M Mühlhäuser
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017
Holonic System Model for Resilient Energy Grid Operation
R Egert, T Grube, F Volk, M Mühlhäuser
Energies 14 (14), 4120, 2021
The system can't perform the operation now. Try again later.
Articles 1–20