From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A tamper-proof audit and control system for the doctor in the loop., , , , и . Brain Informatics, 3 (4): 269-279 (2016)Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI., , , и . CD-MAKE, том 12844 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2021)Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI., , , и . CD-MAKE, том 11015 из Lecture Notes in Computer Science, стр. 1-8. Springer, (2018)Machine Learning and Knowledge Extraction to Support Work Safety for Smart Forest Operations., , , , , , , , , и . CD-MAKE, том 13480 из Lecture Notes in Computer Science, стр. 362-375. Springer, (2022)Real-Time Forensics Through Endpoint Visibility., , , , и . ICDF2C, том 216 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 18-32. Springer, (2017)Protecting Anonymity in Data-Driven Biomedical Science., , , , и . Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, том 8401 из Lecture Notes in Computer Science, Springer, (2014)Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach., , , , , , и . BIRS-IMLKE, том 10344 из Lecture Notes in Computer Science, стр. 13-50. Springer, (2015)QR Code Security: A Survey of Attacks and Challenges for Usable Security., , , , , и . HCI (24), том 8533 из Lecture Notes in Computer Science, стр. 79-90. Springer, (2014)Penetration Testing Artificial Intelligence., , , и . ERCIM News, (2020)Forensics using Internal Database Structures., , и . ERCIM News, (2017)