Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness., , , , , , and . CoRR, (2019)Secure and Utility-Aware Data Collection with Condensed Local Differential Privacy., , , , and . CoRR, (2019)Utility-aware and privacy-preserving mobile query services., , and . CoRR, (2019)Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces., , , , and . ACM Conference on Computer and Communications Security, page 196-211. ACM, (2018)Explode: An Extensible Platform for Differentially Private Data Analysis., , , and . ICDM Workshops, page 1300-1303. IEEE Computer Society, (2016)PrivacyZone: A Novel Approach to Protecting Location Privacy of Mobile Users., , , , , and . BigData, page 1238-1247. IEEE, (2018)Differentially Private and Utility Preserving Publication of Trajectory Data., , , and . IEEE Trans. Mob. Comput., 18 (10): 2315-2329 (2019)Differentially Private Model Publishing for Deep Learning., , , , and . IEEE Symposium on Security and Privacy, page 332-349. IEEE, (2019)Graph-based modelling of query sets for differential privacy., , , and . SSDBM, page 3:1-3:10. ACM, (2016)Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability., , , , and . CoRR, (2019)