Search

Your search keyword '"Mokhtar, Sonia Ben"' showing total 128 results

Search Constraints

Start Over You searched for: Author "Mokhtar, Sonia Ben" Remove constraint Author: "Mokhtar, Sonia Ben"
128 results on '"Mokhtar, Sonia Ben"'

Search Results

1. Differentially private and decentralized randomized power method

2. On the resilience of Collaborative Learning-based Recommender Systems Against Community Detection Attack

3. Survey of Federated Learning Models for Spatial-Temporal Mobility Applications

4. Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone

5. PEPPER: Empowering User-Centric Recommender Systems over Gossip Learning

6. SplitBFT: Improving Byzantine Fault Tolerance Safety Using Trusted Compartments

7. Enhancing Robustness of On-line Learning Models on Highly Noisy Data

8. RAD: On-line Anomaly Detection for Highly Unreliable Data

9. X-Search: Revisiting Private Web Search using Intel SGX

10. CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions

11. Taming Tail Latency in Key-Value Stores: A Scheduling Perspective

12. Adaptive Location Privacy with ALP

13. Time Distortion Anonymization for the Publication of Mobility Data with High Utility

14. Privacy-preserving Publication of Mobility Data with High Utility

15. Differentially Private Location Privacy in Practice

17. Community Detection Attack against Collaborative Learning-based Recommender Systems

23. SplitBFT

24. PEPPER

26. Amigo Aware Services

27. Context-Aware Service Composition in Pervasive Computing Environments

28. Semantics-Aware Services for the Mobile Computing Environment

29. Ad Hoc Composition of User Tasks in Pervasive Computing Environments

33. GradSec

34. Taming Tail Latency in Key-Value Stores: A Scheduling Perspective

36. TailX: Scheduling Heterogeneous Multiget Queries to Improve Tail Latencies in Key-Value Stores

37. COCOA: COnversation-based service COmposition in pervAsive computing environments with QoS support

46. X-search

47. PrivaSense

48. AP-Attack

49. SAFETHINGS: Data Security by Design in the IoT

Catalog

Books, media, physical & digital resources