Search for persons
X
?
2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) ,
2
Probabilistic Dataset Reconstruction from Interpretable Mod..:
, In:
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
3
Crypto'Graph: Leveraging Privacy-Preserving Distributed Lin..:
, In:
?
2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) ,
4
Exploiting Fairness to Enhance Sensitive Attributes Reconst..:
, In:
?
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management ,
5
SNAKE Challenge: Sanitization Algorithms under Attack:
, In:
?
GLOBECOM 2023 - 2023 IEEE Global Communications Conference ,
7
Leveraging In-Network Computing for Privacy-Aware Real-Time..:
, In:
?
Integration of Constraint Programming, Artificial Intelligence, and Operations Research; Lecture Notes in Computer Science ,
10
Leveraging Integer Linear Programming to Learn Optimal Fair..:
, In:
?
Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography ,
11
PROBONITE : PRivate One-Branch-Only Non-Interactive deci..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
12
Multi-Freq-LDPy: Multiple Frequency Estimation Under Local ..:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
14
DySan: Dynamically Sanitizing Motion Sensor Data Against Se..:
, In:
?
AI Approaches to the Complexity of Legal Systems XI-XII; Lecture Notes in Computer Science ,
15