Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A tamper-proof audit and control system for the doctor in the loop., , , , and . Brain Informatics, 3 (4): 269-279 (2016)Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach., , , , , , and . BIRS-IMLKE, volume 10344 of Lecture Notes in Computer Science, page 13-50. Springer, (2015)On Graph Extraction from Image Data., , and . Brain Informatics and Health, volume 8609 of Lecture Notes in Computer Science, page 552-563. Springer, (2014)Machine Learning and Data Mining Methods for Managing Parkinson's Disease., , , , , and . Machine Learning for Health Informatics, volume 9605 of Lecture Notes in Computer Science, Springer, (2016)Towards the Augmented Pathologist: Challenges of Explainable-AI in Digital Pathology., , , , , , and . CoRR, (2017)Interactive Anonymization for Privacy aware Machine Learning., , and . IAL@PKDD/ECML, volume 1924 of CEUR Workshop Proceedings, page 15-26. CEUR-WS.org, (2017)The Need for Speed of AI Applications: Performance Comparison of Native vs. Browser-based Algorithm Implementations., , , and . CoRR, (2018)The More the Merrier - Federated Learning from Local Sphere Recommendations., , , and . CD-MAKE, volume 10410 of Lecture Notes in Computer Science, page 367-373. Springer, (2017)DO NOT DISTURB? Classifier Behavior on Perturbed Datasets., , and . CD-MAKE, volume 10410 of Lecture Notes in Computer Science, page 155-173. Springer, (2017)Privacy Aware Machine Learning and the "Right to be Forgotten"., , , and . ERCIM News, (2016)