Author of the publication

Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning.

, , , and . PST, page 1-7. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile 'tsunagari-kan': always-on, casual telecommunication., and . Mobile HCI, page 227-230. ACM, (2005)PPM: Privacy Policy Manager for Personalized Services., , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 377-392. Springer, (2013)Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric., , , , , and . IEEE Access, (2020)Password Based Anonymous Authentication with Private Information Retrieval., , , , and . J. Digit. Inf. Manag., 9 (2): 72-78 (2011)A data-driven approach for reconstructing bifurcation diagrams of discrete dynamical systems., , and . LifeTech, page 294-295. IEEE, (2019)Certificate Management Scheme for VANETs Using Blockchain Structure., , , , , and . Cryptogr., 6 (2): 20 (2022)Private Information Retrieval from Coded Storage in the Presence of Omniscient and Limited-Knowledge Byzantine Adversaries., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (9): 1271-1283 (2021)Learning Multimodal Representations for Drowsiness Detection., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (8): 11539-11548 (2022)Analysis of Trust Factors in Children's Abilities to Use Digital Devices., , , and . GoodIT, page 82-88. ACM, (2022)Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning., , , and . PST, page 1-7. IEEE, (2023)