Author of the publication

Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer.

, , , , , , and . WISE (2), volume 12343 of Lecture Notes in Computer Science, page 185-200. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models., , , , , and . IEEE Trans. Serv. Comput., 15 (3): 1526-1539 (2022)A Blockchain-Based Consent Mechanism for Access to Fitness Data in the Healthcare Context., , and . CoRR, (2022)Robust Training Using Natural Transformation., , , , , and . CoRR, (2021)SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market., , , and . CoRR, (2023)Adversarial Defense by Latent Style Transformations., , , , , and . CoRR, (2020)A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection., , , , , and . CoRR, (2024)Cybersecurity in Pacific Island nations., , and . Commun. ACM, 63 (4): 53-54 (2020)Security knowledge representation artifacts for creating secure IT systems., , , and . Comput. Secur., (2017)Cybersecurity Maturity in the Pacific Islands - Informing a Regional CERT Framework., , and . HICSS, page 1-10. ScholarSpace, (2022)R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy., , , , and . IJCNN, page 1-9. IEEE, (2022)