Author of the publication

Achieving Privacy and Tracing Unauthorised Usage: Anonymisation-based Fingerprinting of Private Data.

, , and . IEEE Big Data, page 5578-5587. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases., and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 401-415. Springer, (2020)The Map of Mozart., , and . ISMIR, page 351-352. (2006)Evaluation of Preserved Scientific Processes., , and . TPDL, volume 8092 of Lecture Notes in Computer Science, page 434-437. Springer, (2013)Visualising Clusters in Self-Organising Maps with Minimum Spanning Trees., and . ICANN (2), volume 6353 of Lecture Notes in Computer Science, page 426-431. Springer, (2010)Visualising Class Distribution on Self-organising Maps., , and . ICANN (2), volume 4669 of Lecture Notes in Computer Science, page 359-368. Springer, (2007)From Preserving Data to Preserving Research: Curation of Process and Context., , , , and . TPDL, volume 8092 of Lecture Notes in Computer Science, page 490-491. Springer, (2013)Using ontologies to capture the semantics of a (business) process for digital preservation., , , , , and . Int. J. Digit. Libr., 15 (2-4): 129-152 (2015)Detecting Adversarial Examples Using Surrogate Models., , and . Mach. Learn. Knowl. Extr., 5 (4): 1796-1825 (December 2023)Resilience within Ultrascale Computing System: Challenges and Opportunities from Nesus Project., , , , , , , and . Supercomput. Front. Innov., 2 (2): 46-63 (2015)I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences., , and . ACM Comput. Surv., 55 (14s): 324:1-324:41 (2023)