Author of the publication

User Centered and Privacy-Driven Process Mining System Design - (Extended Abstract).

, , , , and . Informatik Spektrum, 42 (5): 347-348 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Baracaldo, Nathalie
add a person with the name Baracaldo, Nathalie
 

Other publications of authors with the same name

An adaptive risk management and access control framework to mitigate insider threats., and . Computers & Security, (2013)IEEE IRI 2014 invited industry talks (I): Managing shared information in multi-tenant service provider applications., , , , and . IRI, page xxxii-xxxv. IEEE Computer Society, (2014)Privacy-Preserving Process Mining: Differential Privacy for Event Logs, , , , and . Business & Information Systems Engineering, 61 (5): 1--20 (October 2019)Simulating the effect of privacy concerns in online social networks., , , and . IRI, page 519-524. IEEE Systems, Man, and Cybernetics Society, (2011)A Hybrid Approach to Privacy-Preserving Federated Learning., , , , , and . CoRR, (2018)Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering., , , , , , , and . SafeAI@AAAI, volume 2301 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Complex Collaborative Physical Process Management: A Position on the Trinity of BPM, IoT and DA., , , , , , and . PRO-VE, volume 534 of IFIP Advances in Information and Communication Technology, page 244-253. Springer, (2018)HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning., , , , and . CoRR, (2019)A Hybrid Approach to Privacy-Preserving Federated Learning - (Extended Abstract)., , , , , , and . Informatik Spektrum, 42 (5): 356-357 (2019)Privacy-preserving Process Mining: Differential - Privacy for Event Logs (Extended Abstract)., , , , and . Informatik Spektrum, 42 (5): 349-351 (2019)