Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generation of Synthetic Trajectory Microdata from Language Models., , , and . PSD, volume 13463 of Lecture Notes in Computer Science, page 172-187. Springer, (2022)The limits of differential privacy (and its misuse in data release and machine learning)., , and . Commun. ACM, 64 (7): 33-35 (2021)Detecting Bad Answers in Survey Data Through Unsupervised Machine Learning., , , , , and . PSD, volume 12276 of Lecture Notes in Computer Science, page 309-320. Springer, (2020)Efficient privacy-preserving implicit authentication., and . Comput. Commun., (2018)Achieving Security and Privacy in Federated Learning Systems: Survey, Research Challenges and Future Directions., , , , , and . CoRR, (2020)Enhanced Security and Privacy via Fragmented Federated Learning., , , and . CoRR, (2022)Privacy-Preserving Computation of the Earth Mover's Distance., and . ISC, volume 12472 of Lecture Notes in Computer Science, page 409-423. Springer, (2020)Flexible and Robust Privacy-Preserving Implicit Authentication., , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 18-34. Springer, (2015)Group Discounts Compatible with Buyer Privacy., and . DPM/SETOP/QASA, volume 8872 of Lecture Notes in Computer Science, page 47-57. Springer, (2014)Privacy-Preserving Loyalty Programs., and . DPM/SETOP/QASA, volume 8872 of Lecture Notes in Computer Science, page 133-146. Springer, (2014)