Computational neuroscientist, junior group leader at the FMI, and assistant professor at the University of Basel, Switzerland. Main interest in learning, memory, and information processing in biological spiking neural networks.
|2014||PhD, School of Computer and Communication Sciences, EPF Lausanne, Switzerland|
|2009||Diplom in Physics, Helmholtz-Institute for Radiation- and Nuclear Physics, University of Bonn, Germany|
|2006||Physics, Exchange Program, Australian National University, Canberra, Australia|
|2022-present||Assistant Professor, University of Basel, Switzerland|
|2019-present||Junior Group Leader, Friedrich Miescher Institute for Biomedical Research, Basel, Switzerland|
|2017-2019||Sir Henry Wellcome Postdoctoral Fellow, University of Oxford, UK|
|2015-2017||Postdoctoral Fellow, Stanford University, USA|
Short bio text
Friedemann Zenke studied physics at the University of Bonn, and the Australian National University in Canberra, before moving to computational neuroscience for his Ph.D. with Wulfram Gerstner at the Ecole Polytechnique Fédérale de Lausanne (EPFL). Subsequently, Friedemann joined Surya Ganguli’s group at Stanford as a post-doc, and later, he moved to the University of Oxford as a Sir Henry Wellcome fellow with Tim Vogels. Currently, Friedemann is a research group leader at the Friedrich Miescher Institute for Biomedical Research (FMI) and an assistant professor at the University of Basel, Switzerland. His group addresses fundamental theoretical questions about biological neural networks and learning algorithms.
For a number of reasons, I have recently set up a new OpenPGP key,
and will be transitioning away from my old one.
My new OpenPGP key is
pub rsa3072 2018-12-06 [SC] 5C684BF762CAE776BE79DA39825D71CAFBAABB88 Key fingerprint = 5C68 4BF7 62CA E776 BE79 DA39 825D 71CA FBAA BB88
And the old key was
pub dsa1024 2007-06-28 [SCA] [expires: 2019-12-06] 975EFCFAF276CA674FBBA2B6A915FE5D32FD331D Key fingerprint = 975E FCFA F276 CA67 4FBB A2B6 A915 FE5D 32FD 331D
If you already know my old key, you can now verify that the new key is
signed by the old one:
gpg --check-sigs '5C684BF762CAE776BE79DA39825D71CAFBAABB88'
Please let me know if you have any problems.