Author of the publication

Evaluating the Impact of Data Anonymization in a Machine Learning Application.

, , , , and . ICCSA (Workshops 4), volume 13380 of Lecture Notes in Computer Science, page 389-400. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cyber warfare perspective on risks related to health IoT devices and contact tracing., , , , , and . Neural Comput. Appl., 35 (19): 13823-13837 (July 2023)Towards a cloud model choice evaluation: comparison between cost/features and ontology-based analysis., , , , and . Int. J. Grid Util. Comput., 14 (1): 15-28 (2023)Quantitative Modeling of the Behaviour of an Autonomic Router., , , and . VALUETOOLS, page 193-194. ACM, (2019)Applying Machine Learning to Weather and Pollution Data Analysis for a Better Management of Local Areas: The Case of Napoli, Italy., , , , , and . IoTBDS, page 354-363. SCITEPRESS, (2021)A Conceptual Model for the General Data Protection Regulation., , and . ICCSA (8), volume 12956 of Lecture Notes in Computer Science, page 60-77. Springer, (2021)Exploring a Federated Learning Approach to Enhance Authorship Attribution of Misleading Information from Heterogeneous Sources., , , , and . IJCNN, page 1-8. IEEE, (2021)Hybrid Simulation of Energy Management in IoT Edge Computing Surveillance Systems., , , and . EPEW, volume 13104 of Lecture Notes in Computer Science, page 345-359. Springer, (2021)XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks., , , and . AINA (5), volume 203 of Lecture Notes on Data Engineering and Communications Technologies, page 317-326. Springer, (2024)Fuzzy-based Severity Evaluation in Privacy Problems: an Application to Healthcare., , , , , and . EDCC, page 147-154. IEEE, (2024)On Performance Evaluation of Security Monitoring in Multitenant Cloud Applications., , , and . PASM, volume 353 of Electronic Notes in Theoretical Computer Science, page 107-127. Elsevier, (2019)