From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Interactive Anonymization for Privacy aware Machine Learning., , и . IAL@PKDD/ECML, том 1924 из CEUR Workshop Proceedings, стр. 15-26. CEUR-WS.org, (2017)Assessing the sovereignty and security of the Austrian internet., , и . ICSSA, стр. 15-25. IEEE, (2020)Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications., , , , , , и . NDSS, The Internet Society, (2012)Privacy by Design Data Exchange Between CSIRTs., , и . APF, том 10518 из Lecture Notes in Computer Science, стр. 104-119. Springer, (2017)SoK: Automatic Deobfuscation of Virtualization-protected Applications., , , , и . ARES, стр. 6:1-6:15. ACM, (2021)A tamper-proof audit and control system for the doctor in the loop., , , , и . Brain Informatics, 3 (4): 269-279 (2016)Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI., , , и . CD-MAKE, том 12844 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2021)Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI., , , и . CD-MAKE, том 11015 из Lecture Notes in Computer Science, стр. 1-8. Springer, (2018)Machine Learning and Knowledge Extraction to Support Work Safety for Smart Forest Operations., , , , , , , , , и . CD-MAKE, том 13480 из Lecture Notes in Computer Science, стр. 362-375. Springer, (2022)Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach., , , , , , и . BIRS-IMLKE, том 10344 из Lecture Notes in Computer Science, стр. 13-50. Springer, (2015)