Author of the publication

TripleBlind: A Privacy-Preserving Framework for Decentralized Data and Algorithms.

, , , , , , , , , and . NeurIPS (Competition and Demos), volume 176 of Proceedings of Machine Learning Research, page 343-348. PMLR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of the SSL 3.0 protocol, and . WOEC 1996: Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce, page 4. Berkeley, CA, USA, USENIX Association, (1996)The cognition of comics: What "comics" can tell us about the mind., , , and . CogSci, cognitivesciencesociety.org, (2014)Audio Adversarial Examples: Targeted Attacks on Speech-to-Text, and . (2018)cite arxiv:1801.01944.Secure Verification of Location Claims, , and . Proceedings of the 2Nd ACM Workshop on Wireless Security, page 1--10. New York, NY, USA, ACM, (September 2003)Technological Platforms and Innovation: Review, Integration, and Extension., , and . AMCIS, Association for Information Systems, (2015)Designing SPOCs for Student Engagement - Experiences from Management Education., , , , and . EMOOCs-WIP, volume 1841 of CEUR Workshop Proceedings, page 40-46. CEUR-WS.org, (2017)Managing Cloud Computing Across the Product Lifecycle: Development of a Conceptual Model., and . WEB, volume 403 of Lecture Notes in Business Information Processing, page 133-142. Springer, (2019)Privacy and Security in Library RFID, and . (2004)Analyzing internet voting security, , , and . Communications of the ACM Volume 47 , Issue 10 (October 2004), (2004)Towards Evaluating the Robustness of Neural Networks, and . (2016)cite arxiv:1608.04644.