Get my own profile
Public access
View all44 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jilles VreekenCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Luc De Raedtprofessor, KU Leuven & guestprofessor, Örebro UniversityVerified email at cs.kuleuven.be
Siegfried NijssenICTEAM, EPL, Université catholique de Louvain; Universiteit LeidenVerified email at uclouvain.be
Thomas BäckProfessor of Computer Science, Leiden University; Chief Scientist, NORCE Research Centre, NorwayVerified email at liacs.leidenuniv.nl
Hugo ProençaBooking.comVerified email at liacs.leidenuniv.nl
Vladimir DzyubaFaktionVerified email at faktion.com
Antti UkkonenUniversity of HelsinkiVerified email at helsinki.fi
MP JanssenSanquin Blood Supply Foundation; Leiden UniversityVerified email at sanquin.nl
Thanh Le VanJanssen Pharmaceutica NV - Johnson and JohnsonVerified email at its.jnj.com
Arno KnobbeLIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Francesco BonchiResearch Director at CentaiVerified email at centai.eu
Lincen YangPostdoc, Leiden UniversityVerified email at liacs.leidenuniv.nl
Marieke VinkenoogNetherlands Forensic Institute & Leiden UniversityVerified email at nfi.nl
Sander van RijnNetherlands eScience CenterVerified email at esciencecenter.nl
Tijl De BieFull Professor, Ghent UniversityVerified email at ugent.be
Hao WangLeiden UniversityVerified email at liacs.leidenuniv.nl
Peter GrünwaldGroup Leader Machine Learning, CWI; Professor of Statistics, Leiden UniversityVerified email at cwi.nl
Lieven VerbekeCentrica Business SolutionsVerified email at centrica.com
Jimmy Van den EyndenAssociate professor at Ghent UniversityVerified email at ugent.be
Dries De MaeyerVerified email at its.jnj.com
Follow
Matthijs van Leeuwen
Associate Professor, Leiden University
Verified email at liacs.leidenuniv.nl - Homepage