69 results on '"Domingo-Ferrer, Josep"'
Search Results
2. LFighter: Defending against the label-flipping attack in federated learning
3. Secure, accurate and privacy-aware fully decentralized learning via co-utility
4. Decentralized k-anonymization of trajectories via privacy-preserving tit-for-tat
5. Multi-Task Faces (Mtf) Data Set: A Legally and Ethically Compliant Collection of Face Images for Various Classification Tasks
6. Enhancing Efficiency and Data Utility in Longitudinal Data Anonymization
7. FL-Defender: Combating targeted attacks in federated learning
8. Legacy Statistical Disclosure Limitation Techniques for Protecting 2020 Decennial US Census: Still a Viable Option
9. Database Reconstruction Is Not So Easy and Is Different from Reidentification
10. Explainability in Artificial Intelligence: Hermeneutic Issues (in French)
11. Differentially private publication of database streams via hybrid video coding
12. Achieving security and privacy in federated learning systems: Survey, research challenges and future directions
13. Machine learning explainability via microaggregation and shallow decision trees
14. Differentially private data publishing via cross-moment microaggregation
15. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
16. Differentially private data publishing via optimal univariate microaggregation and record perturbation
17. Efficient privacy-preserving implicit authentication
18. Co-utile disclosure of private data in social networks
19. Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds
20. Anonymous and secure aggregation scheme in fog-based public cloud computing
21. Co-Utility: Self-Enforcing protocols for the mutual benefit of participants
22. Canvas White Paper 4 Technological Challenges in Cybersecurity
23. Co-utile P2P ridesharing via decentralization and reputation management
24. Self-enforcing protocols via co-utile reputation management
25. Cloud Cryptography: Theory, Practice and Future Research Directions
26. Utility-preserving differentially private data releases via individual ranking microaggregation
27. Privacy-aware loyalty programs
28. New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users
29. Practical secure and privacy-preserving scheme for value-added applications in VANETs
30. A k-anonymous approach to privacy preserving collaborative filtering
31. Security and privacy in unified communications: Challenges and solutions
32. Semantic variance: An intuitive measure for ontology accuracy evaluation
33. From t-closeness to differential privacy and vice versa in data anonymization
34. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
35. FRR: Fair remote retrieval of outsourced private medical records in electronic health networks
36. Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security
37. Optimal data-independent noise for differential privacy
38. Anonymization of nominal data based on semantic marginality
39. On the privacy offered by (k, δ)-anonymity
40. Distributed multicast of fingerprinted content based on a rational peer-to-peer community
41. Provably secure threshold public-key encryption with adaptive security and short ciphertexts
42. Microaggregation- and permutation-based anonymization of movement data
43. Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios
44. Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search: The multi-hop scenario
45. Predictive protocol for the scalable identification of RFID tags through collaborative readers
46. Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
47. Asymmetric group key agreement protocol for open networks and its application to broadcast encryption
48. A bibliometric index based on the collaboration distance between cited and citing authors
49. Decapitation of networks with and without weights and direction: The economics of iterated attack and defense
50. Hybrid microdata using microaggregation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.