Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph., and . Sci. Eng. Ethics, 26 (3): 1267-1285 (2020)A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning., , , and . ACM Comput. Surv., 55 (8): 160:1-160:16 (2023)Secure, accurate and privacy-aware fully decentralized learning via co-utility., , , and . Comput. Commun., (July 2023)Generation of Synthetic Trajectory Microdata from Language Models., , , and . PSD, volume 13463 of Lecture Notes in Computer Science, page 172-187. Springer, (2022)The limits of differential privacy (and its misuse in data release and machine learning)., , and . Commun. ACM, 64 (7): 33-35 (2021)Achieving security and privacy in federated learning systems: Survey, research challenges and future directions., , , , , and . Eng. Appl. Artif. Intell., (2021)Detecting Bad Answers in Survey Data Through Unsupervised Machine Learning., , , , , and . PSD, volume 12276 of Lecture Notes in Computer Science, page 309-320. Springer, (2020)Efficient privacy-preserving implicit authentication., and . Comput. Commun., (2018)Achieving Security and Privacy in Federated Learning Systems: Survey, Research Challenges and Future Directions., , , , , and . CoRR, (2020)GRAIMATTER Green Paper: Recommendations for disclosure control of trained Machine Learning (ML) models from Trusted Research Environments (TREs)., , , , , , , , , and 9 other author(s). CoRR, (2022)