Author of the publication

A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models.

, , , , and . IH&MMSec, page 171-176. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Federated Learning: Analysis of Different Cryptographic Tools., , , , , and . SECRYPT, page 669-674. SCITEPRESS, (2022)SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space., , , , , , , , , and 31 other author(s). DATE, page 1-4. IEEE, (2024)Data-driven Anonymization Process Applied to Time Series., , and . SIMBig, volume 2029 of CEUR Workshop Proceedings, page 80-90. CEUR-WS.org, (2017)NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence., , , , , , , , , and 21 other author(s). ARES, page 69:1-69:11. ACM, (2024)A Projected Stochastic Gradient Algorithm for Estimating Shapley Value Applied in Attribute Importance., and . CD-MAKE, volume 12279 of Lecture Notes in Computer Science, page 97-115. Springer, (2020)When Federated Learning Meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection., , , , , and . Mach. Learn. Knowl. Extr., 5 (4): 1382-1406 (December 2023)A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models., , , , and . IH&MMSec, page 171-176. ACM, (2021)