Author of the publication

Towards Privacy and Utility in Tourette TIC Detection Through Pretraining Based on Publicly Available Video Data of Healthy Subjects.

, , , , , , , and . ICASSP, page 1-5. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Passive and active attackers in noiseless privacy., , and . CoRR, (2019)Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms., , , and . CoRR, (2021)Divide and Funnel: a Scaling Technique for Mix-Networks., , , and . IACR Cryptol. ePrint Arch., (2021)PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple., , and . CCS, page 2192-2194. ACM, (2018)AnoA: A Framework for Analyzing Anonymous Communication Protocols., , , , and . J. Priv. Confidentiality, (2016)Comprehensive Anonymity Trilemma: User Coordination is not enough., , , and . Proc. Priv. Enhancing Technol., 2020 (3): 356-383 (2020)Abstracting cryptographic protocols.. Saarland University, (2016)Deniable Upload and Download via Passive Participation., , , , , and . NSDI, page 649-666. USENIX Association, (2019)Towards Privacy and Utility in Tourette TIC Detection Through Pretraining Based on Publicly Available Video Data of Healthy Subjects., , , , , , , and . ICASSP, page 1-5. IEEE, (2023)CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks., , , , , and . AsiaCCS, page 3. ACM, (2017)