Author of the publication

When Federated Learning Meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection.

, , , , , and . Mach. Learn. Knowl. Extr., 5 (4): 1382-1406 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion., , and . INFOCOM Workshops, page 1051-1052. IEEE, (2019)Federated machine learning through edge ready architectures with privacy preservation as a service., , , , , , , , , and 1 other author(s). FNWF, page 347-350. IEEE, (2022)Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure., and . ACM Conference on Computer and Communications Security, page 2231-2233. ACM, (2018)Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data., and . TrustCom/BigDataSE, page 385-390. IEEE, (2018)SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space., , , , , , , , , and 31 other author(s). DATE, page 1-4. IEEE, (2024)PE-AONT: Partial Encryption combined with an All-or-Nothing Transform., and . CoRR, (2018)Data protection by means of fragmentation in distributed storage systems., and . CFIP/NOTERE, page 1-8. IEEE, (2015)Protecting data confidentiality combining data fragmentation, encryption, and dispersal over a distributed environment. (Protection de la confidentialité des données par un ensemble de méthodes de fragmentation, chiffrement, et dispersion dans un environnement distribué).. Télécom ParisTech, France, (2018)A Secure Federated Learning: Analysis of Different Cryptographic Tools., , , , , and . SECRYPT, page 669-674. SCITEPRESS, (2022)Secure Data Sharing with Fast Access Revocation through Untrusted Clouds., , and . NTMS, page 1-5. IEEE, (2019)