From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Privacy of the Opal Data Release: A Response., , и . CoRR, (2017)Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning., , и . CCSW, стр. 15-26. ACM, (2020)Tracking and Personalization., , и . Modern Socio-Technical Perspectives on Privacy, (2022)Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users., , , , , и . CoRR, (2024)Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories., , , , и . ACNS (1), том 13905 из Lecture Notes in Computer Science, стр. 284-308. Springer, (2023)An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps., , и . ACNS, том 13906 из Lecture Notes in Computer Science, стр. 699-725. Springer, (2023)5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System., , , и . CoRR, (2022)A deep dive into the consistently toxic 1% of Twitter., , , , , и . CoRR, (2022)The Value of Collaboration in Convex Machine Learning with Differential Privacy., , , и . CoRR, (2019)Private Processing of Outsourced Network Functions: Feasibility and Constructions., , , и . IACR Cryptology ePrint Archive, (2015)