Author of the publication

Explaining Recurrent Machine Learning Models: Integral Privacy Revisited.

, , and . PSD, volume 12276 of Lecture Notes in Computer Science, page 62-73. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a private vector space model for confidential documents., , and . SAC, page 944-945. ACM, (2013)LockDown: Balance Availability Attack against Lightning Network Channels., , , , and . IACR Cryptol. ePrint Arch., (2019)Towards efficient access control in a mobile agent based wireless sensor network., , , and . CRiSIS, page 1-4. IEEE Computer Society, (2012)LockDown: Balance Availability Attack Against Lightning Network Channels., , , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 245-263. Springer, (2020)Supervised learning using a symmetric bilinear form for record linkage., , and . Inf. Fusion, (2015)Data Privacy with R R., , and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)Advanced Research on Data Privacy in the ARES Project., and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)Provenance and Privacy., , , and . MDAI, volume 10571 of Lecture Notes in Computer Science, page 3-11. Springer, (2017)Semantic Microaggregation for the Anonymization of Query Logs., , , and . Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, page 127-137. Springer, (2010)Agent mobility architecture based on IEEE-FIPA standards., , , , , and . Comput. Commun., 32 (4): 712-729 (2009)