Author of the publication

Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media.

, , and . TrustCom, page 856-863. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual analytics for cyber red teaming., , and . VizSEC, page 1-8. IEEE Computer Society, (2015)A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions., , and . IEEE Access, (2020)Acer Aspire One Netbooks: A Forensic Challenge., , , and . COMPSAC (2), page 404-409. IEEE Computer Society, (2009)978-0-7695-3726-9.The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data., , and . ARES, page 143-149. IEEE Computer Society, (2009)Interactive 3D Visualization of Network Traffic in Time for Forensic Analysis., and . VISIGRAPP (3: IVAPP), page 177-184. SCITEPRESS, (2020)Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool., , , , and . ECIW, page 39-46. Academic Conferences Limited, Reading, UK, (2005)Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process., and . HICSS, page 267. IEEE Computer Society, (2007)Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems., , , , and . MSN, page 711-717. IEEE, (2020)SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems., , and . Cogn. Comput., 16 (5): 2626-2641 (September 2024)Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey., , , , and . ACM Comput. Surv., 55 (9): 191:1-191:43 (2023)