Author of the publication

Secure federated learning applied to medical imaging with fully homomorphic encryption.

, , , , , and . ICAIC, page 1-12. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

X-by-Construction - Correctness Meets Probability., , , , and . ISoLA (1), volume 12476 of Lecture Notes in Computer Science, page 211-215. Springer, (2020)Improving Secure and Robust Patient Service Delivery., , and . ISoLA (1), volume 12476 of Lecture Notes in Computer Science, page 404-418. Springer, (2020)Masterminding change by combining secure system design with security risk assessment., , and . Int. J. Softw. Tools Technol. Transf., 23 (1): 69-70 (2021)Packer classification based on association rule mining., , , and . Appl. Soft Comput., (2022)Sequential Relational Decomposition., , , and . Log. Methods Comput. Sci., (2022)An Application of SMC to continuous validation of heterogeneous systems., , , , , , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 4 (11): e2 (2017)Model-based mutant equivalence detection using automata language equivalence and simulations., , , , , and . J. Syst. Softw., (2018)Featured games., and . Sci. Comput. Program., (2022)Hybrid statistical estimation of mutual information and its application to information flow., , , and . Formal Aspects Comput., 31 (2): 165-206 (2019)*-Continuous Kleene ω-Algebras for Energy Problems., , and . FICS, volume 191 of EPTCS, page 48-59. (2015)