Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET., , and . Clust. Comput., 21 (1): 51-63 (2018)Blockchain as a Service (BaaS): Providers and Trust., and . EuroS&P Workshops, page 67-74. IEEE, (2018)Out of Context: Investigating the Bias and Fairness Concerns of Ärtificial Intelligence as a Service"., , , and . CHI, page 135:1-135:17. ACM, (2023)Reviewable Automated Decision-Making: A Framework for Accountable Algorithmic Systems., , and . FAccT, page 598-609. ACM, (2021)Understanding accountability in algorithmic supply chains., , and . FAccT, page 1186-1197. ACM, (2023)The tensions of data sharing for human rights: A modern slavery case study., , , , and . FAccT, page 974-987. ACM, (2024)The Security Implications of Data Subject Rights., and . IEEE Secur. Priv., 17 (6): 21-30 (2019)Practical fundamental rights impact assessments., , and . Int. J. Law Inf. Technol., 30 (2): 200-232 (2022)Autoscaling Packet Core Network Functions with Deep Reinforcement Learning., , , , and . NOMS, page 1-6. IEEE, (2023)Regulating transparency?: Facebook, Twitter and the german network enforcement act., , , , and . FAT*, page 261-271. ACM, (2020)