Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring Contributions in Privacy-Preserving Federated Learning., , and . ERCIM News, (2021)Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks., , and . ESAS, volume 3813 of Lecture Notes in Computer Science, page 113-127. Springer, (2005)You are what you like! Information leakage through users' Interests., , and . NDSS, The Internet Society, (2012)Protecting against physical resource monitoring., , and . WPES, page 23-32. ACM, (2011)Compression Boosts Differentially Private Federated Learning., , , and . CoRR, (2020)Constrained differentially private federated learning for low-bandwidth devices., , , and . UAI, volume 161 of Proceedings of Machine Learning Research, page 1756-1765. AUAI Press, (2021)Client-specific Property Inference against Secure Aggregation in Federated Learning., , and . WPES@CCS, page 45-60. ACM, (2023)Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets., , , and . IEEE Symposium on Security and Privacy Workshops, page 72-79. IEEE, (2019)The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks., , and . MASS, page 1-6. IEEE Computer Society, (2007)Industry-Scale Orchestrated Federated Learning for Drug Discovery., , , , , , , , , and 37 other author(s). AAAI, page 15576-15584. AAAI Press, (2023)