Author of the publication

A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems.

, , , , , and . IEEE Trans. Ind. Informatics, 16 (9): 6092-6102 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integration of Heterogeneous Web Service Components., and . WSMAI, page 87-94. INSTICC Press, (2004)APLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control., , and . EuroPLoP, page 331-346. UVK - Universitaetsverlag Konstanz, (2001)Efficient privacy preservation of big data for accurate data mining., , , , and . Inf. Sci., (2020)Privacy preserving distributed machine learning with federated learning., , , , and . Comput. Commun., (2021)PPaaS: Privacy Preservation as a Service., , , , and . CoRR, (2020)A Cost Based Coordination Model for Long Running Transactions in Web Services., , and . iiWAS, volume 196 of books@ocg.at, page 97-108. Austrian Computer Society, (2005)An analytical study of cache invalidation algorithms in mobile environments., , and . Int. J. Pervasive Comput. Commun., 2 (1): 3-14 (2006)Authorization Control for a Semantic Data Repository through an Inference Policy Engine., , and . IEEE Trans. Dependable Secur. Comput., 10 (6): 328-340 (2013)Working Group Report on Information Infrastructure for Global and Virtual Enterprises., , , and . WETICE, page 62-67. IEEE Computer Society, (1997)Minimal Traffic-Constrained Similarity-Based SOAP Multicast Routing Protocol., , , and . OTM Conferences (1), volume 4803 of Lecture Notes in Computer Science, page 558-576. Springer, (2007)