Author of the publication

Adaptive Attacks and Targeted Fingerprinting of Relational Data.

, , and . IEEE Big Data, page 5792-5801. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases., and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 401-415. Springer, (2020)Differentially Private Federated Learning: Privacy and Utility Analysis of Output Perturbation and DP-SGD., , and . IEEE Big Data, page 5549-5558. IEEE, (2023)The Map of Mozart., , and . ISMIR, page 351-352. (2006)Anomaly Detection from Distributed Data Sources via Federated Learning., and . AINA (2), volume 450 of Lecture Notes in Networks and Systems, page 317-328. Springer, (2022)Evaluation of Preserved Scientific Processes., , and . TPDL, volume 8092 of Lecture Notes in Computer Science, page 434-437. Springer, (2013)Visualising Clusters in Self-Organising Maps with Minimum Spanning Trees., and . ICANN (2), volume 6353 of Lecture Notes in Computer Science, page 426-431. Springer, (2010)Visualising Class Distribution on Self-organising Maps., , and . ICANN (2), volume 4669 of Lecture Notes in Computer Science, page 359-368. Springer, (2007)From Preserving Data to Preserving Research: Curation of Process and Context., , , , and . TPDL, volume 8092 of Lecture Notes in Computer Science, page 490-491. Springer, (2013)Poisoning Attacks against Feature-Based Image Classification., and . CODASPY, page 358-360. ACM, (2022)Macro-level Inference in Collaborative Learning., and . CODASPY, page 373-375. ACM, (2022)