Author of the publication

Cyber-Physical Systems Design for Runtime Thrustworthiness Maintenance Supported by Tools.

, , , , , , , and . REFSQ Workshops, volume 1342 of CEUR Workshop Proceedings, page 148-155. CEUR-WS.org, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks., , and . CoRR, (2024)Data Minimization for GDPR Compliance in Machine Learning Models., , , , and . CoRR, (2020)Brief Announcement: A Consent Management Solution for Enterprises., , , , , and . CSCML, volume 10332 of Lecture Notes in Computer Science, page 189-192. Springer, (2017)Improved Membership Inference Attacks Against Language Classification Models., , and . CoRR, (2023)AI privacy toolkit., , , , and . SoftwareX, (May 2023)An end-to-end framework for privacy risk assessment of AI models., , and . SYSTOR, page 142. ACM, (2022)Forgotten @ Scale: A Practical Solution for Implementing the Right To Be Forgotten in Large-Scale Systems., , , , , , , and . CoRR, (2019)A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime., , , , , , , and . REFSQ Workshops, volume 1342 of CEUR Workshop Proceedings, page 142-147. CEUR-WS.org, (2015)Applying Artificial Intelligence Privacy Technology in the Healthcare Domain., , , and . MIE, volume 294 of Studies in Health Technology and Informatics, page 121-122. IOS Press, (2022)Application-Screen Masking: A Hybrid Approach., , , , , and . IEEE Software, 32 (4): 40-45 (2015)