The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for pst with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-2004 (41) 2005 (36) 2006 (91) 2007 (36) 2008 (56) 2009-2010 (36) 2011 (39) 2012 (44) 2013 (52) 2014 (58) 2015 (29) 2016 (106) 2017 (49) 2018 (54) 2019 (52) 2020-2021 (67) 2022 (37) 2023 (57) 2024 (1)
Publication types (Num. hits)
article(16) inproceedings(906) proceedings(19)
Venues (Conferences, Journals, ...)
PST(823) IFIPTM(57) CoRR(3) Bioinform.(2) FPGA(2) ICML(2) IJCNN(2) J. Medical Syst.(2) AAAI/IAAI(1) ACIS-ICIS(1) ACM SIGPLAN Notices(1) ASP-DAC(1) BCD(1) CIBCB(1) CIKM(1) CPM(1) More (+10 of total 56)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 186 occurrences of 151 keywords

Results
Found 941 publication records. Showing 941 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
123Vishal Khandelwal, Ankur Srivastava 0001 Variability-driven formulation for simultaneous gate sizing and post-silicon tunability allocation. Search on Bibsonomy ISPD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF post-silicon tunability, variability, stochastic optimization, timing optimization, gate sizing
105Vishal Khandelwal, Ankur Srivastava 0001 Variability-Driven Formulation for Simultaneous Gate Sizing and Postsilicon Tunability Allocation. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
88Richard Johnson, David Pearson, Keshav Pingali The Program Structure Tree: Computing Control Regions in Linear Time. Search on Bibsonomy PLDI The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
85Huiqiang Wang, D. X. Liu, D. Xu, Y. Y. Lan, X. Y. Li, Qian Zhao A Holistic Approach to Survivable Distributed Information System for Critical Applications. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF DISCA, PST-based model, Evaluation, Survivability
71 Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006 Search on Bibsonomy PST The full citation details ... 2006 DBLP  BibTeX  RDF
71Vikram Goyal, Shyam K. Gupta 0001, Shobhit Saxena Query rewriting for detection of privacy violation through inferencing. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71EunJoung Byun, SeokIn Kim, HongSoo Kim, SungJin Choi, JangWon Choi, Chong-Sun Hwang MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Sylvia L. Osborn Role-based access control: past, present and future. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Viktor Krammer Phishing defense against IDN address spoofing attacks. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF usability, web browsers, phishing, internet security, unicode, internationalized domain names
71Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl Embedding verifiable information flow analysis. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF embedded systems, static analysis, information flow, confidentiality, language-based security, smart objects
71Candido Rodriguez, Ajay Daryanani, Diego R. López, Jose M. Macias AA-RR: working with authentication and authorization infrastructures. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, software testing, identification, computer network security
71Wenyin Zhang, Ningde Jin Chinese text watermarking based on occlusive components. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Chinese text watermarking, digital watermarking
71A. K. M. Harun-Ar-Rashid The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distribution. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Stephanie Chow Ontario healthcare privacy act: compliant ad hoc healthcare applications. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Gregory B. Newby Paths to creativity in security careers. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Mathew Graves, Mohammad Zulkernine Bridging the gap: software specification meets intrusion detector. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack languages, intrusion detection, software security, software specification
71Muhammad Alam, Michael Hafner, Ruth Breu Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF administrative role based access control, permission-level delegation, service oriented architectures, model-driven architecture
71Reto Kohlas, Jacek Jonczy, Rolf Haenni Towards a precise semantics for authenticity and trust. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Michel Deriaz, Jean-Marc Seigneur Trust and security in spatial messaging: FoxyTag, the speed camera case study. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Jinshan Liu, Valérie Issarny An incentive compatible reputation mechanism for ubiquitous computing environments. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ubiquitous computing, mobile ad hoc networks, incentive compatibility, reputation mechanism
71Thomas W. Lauer, Xiaodong Deng Building online trust through privacy policies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta A new fair non-repudiation protocol for secure negotiation and contract signing. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange
71Eugenia Kondratova, Stephen Marsh 0001, Ali A. Ghorbani 0001 Trust-based contextual information filtering. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy and trust, mobility, context, information filtering
71Yang Bo, Wang Qin An efficient traitor tracing scheme based on MDS code. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF traitor tracing, collusion-resistant, MDS code
71Yunhai Tong, Guohui Sun, Peng Zhang, Shiwei Tang Privacy-preserving OLAP based on output perturbation across multiple sites. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Jie Zhang 0002, Ali A. Ghorbani 0001, Robin Cohen An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trust, e-commerce, multiagent systems, familiarity
71Marco Casassa Mont, Robert Thyne Privacy policy enforcement in enterprises with identity management solutions. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, access control, identity management, policy enforcement
71Deepak Venugopal, Guoning Hu, Nicoleta Roman Intelligent virus detection on mobile devices. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF common functionality, security, mobile, virus detection, DLL
71Mehran Nadjarbashi-Noghani, Ali A. Ghorbani 0001 Design and implementation of a behavioral difference analyzer for network intrusion detection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF differential analyzer, intrusion detection, network security, diversity
71Jie Zhou, Jim Alves-Foss Architecture-based refinements for secure computer systems design. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF architectural refinement, non-functional requirements, multi-level security
71Sushil Jajodia Topological analysis of network attack vulnerability. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Hongxia Jin Privacy, traceability, and anonymity for content protection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anonymous trust, security, privacy, tracing, content protection
71Elisa Bertino Digital identity management and protection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Reza Sadoddin, Ali A. Ghorbani 0001 Alert correlation survey: framework and techniques. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Catalin Bidian From stakeholder goals to product features: towards a role-based variability framework with decision boundary. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software architecture, framework, variability, requirements analysis, product lines, product families, multi-agent modeling
71Jie Liu, Lei Fan 0002, Jianhua Li 0001 Cryptanalysis and improvement on Yang-Shieh authentication schemes. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, smart cards, information security, remote authentication
71Kalman C. Toth Persona concept for web-based identity management. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71George Yee A privacy-preserving UBICOMP architecture. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ubiquitous computing, architecture, privacy protection, privacy policy, UBICOMP
71Gilbert Ornelas, Paulo Pinheiro da Silva Towards believing answers from cyber-infrastructure-based applications. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta Virtual identities in authentication and authorization scenarios. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Daidalos, ID-token, PANA, RegID, VID, authentication, authorization, identity, diameter, SAML
71Yin Hua Li, Hye-Young Paik, Boualem Benatallah Formal consistency verification between BPEL process and privacy policy. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF consistency verification, business process, graph transformation, privacy policy
71Xuejun Yang, Xiangli Qu Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF feedback filtering, pre-evaluating set, trust, grid
71Ebrahim Bagheri, Ali A. Ghorbani 0001 Towards an MDA-oriented UML profile for critical infrastructure modeling. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF modeling and simulation, UML profiles, critical infrastructure
71Jude Andrade Mobile access control policy for healthcare applications with XACML. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor Trust modelling for online transactions: a phishing scenario. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Dhiah el Diehn I. Abou-Tair A framework ensuring privacy in a distributed environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, access control, information flow control, policy enforcement
71Ebrahim Bagheri, Ali A. Ghorbani 0001 Behavior analysis through reputation propagation in a multi-context environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-context reputation, reputation formalization, reputation propagation
71Harshit Nayyar, Ali A. Ghorbani 0001 Approximate autoregressive modeling for network attack detection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Barrington Young, Raj Bhatnagar Secure algorithm for finding K nearest neighbors in distributed databases. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71John B. Folkerts, Hans-Peter Bischof A comparison of reputation-based trust systems. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Hilmi Günes Kayacik, Nur Zincir-Heywood Using self-organizing maps to build an attack map for forensic analysis. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF KDD 99 intrusion detection datasets, neural networks, intrusion detection, self-organizing map
71Honglei Zeng, Maher A. Alhossaini, Li Ding 0001, Richard Fikes, Deborah L. McGuinness Computing trust from revision history. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth 0002, Luc Van Gool, Andreas Steffen Privacy in video surveilled areas. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer vision, cryptography, surveillance, building automation
71Xiangdong An 0001, Dawn N. Jutla, Nick Cercone Dynamic inference control in privacy preference enforcement. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy protection, dynamic bayesian networks, inference control, ubiquitous environments
71Mike Gurski From concept to commercialiazed product: the challenges of privacy technologies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Edward Brown, Khandaker Ahamed An early release heuristic for k-anonymization. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Kenji Imamoto, Kouichi Sakurai Off-line verification of one-time ID in distributed environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Johnson P. Thomas, Sudha Chinni, George Ghinea Trust determination in ad hoc networks. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Dima Alhadidi, Nadia Belblidia, Mourad Debbabi Security crosscutting concerns and AspectJ. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Azzam Mourad, Marc-André Laverdière, Mourad Debbabi Security hardening of open source software. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Jennifer Horkoff, Eric S. K. Yu, Lin Liu 0001 Analyzing trust in technology strategies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF the i* framework, trust, trusted computing, goal modeling, business strategies, model evaluation
71Carsten D. Schultz A trust framework model for situational contexts. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trust framework model, trust, trustworthiness
71Svetlana N. Yanushkevich A concept of intelligent biometric-based early detection and warning system. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF decision making support, physical access control, artificial intelligence, biometrics
71Aaditeshwar Seth, Mirza Omer Beg Achieving privacy and security in radio frequency identification. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Zhengping Wu, Alfred C. Weaver Requirements of federated trust management for service-oriented architectures. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF requirements, trust management, service-oriented computing
71J. Treurniet Detecting low-profile scans in TCP anomaly event data. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed scan detection, scan detection, slow scan detection, network security, TCP, anomaly detection
71Michelle Watson Mobile healthcare applications: a study of access control. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MAVAAN, huddle mode, meditech, roaming mode, standalone mode, MANET
71Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks 0001 Privacy enhanced personalization in e-learning. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, trust, personalization, anonymity, reputation, identity, pseudonymity
71Avner Levin Is workplace surveillance legal in Canada? Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, monitoring, surveillance, work
71Zhengping Wu, Alfred C. Weaver Using web service enhancements to bridge business trust relationships. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF web service enhancements, web service, trust management, trust establishment
71Alex Pandelidis Defining the security required for WAP based mobile ticket sales. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile ticket sales, security, WAP, cellular
71Jiantao Kong, Karsten Schwan, Patrick M. Widener Protected data paths: delivering sensitive data via untrusted proxies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Muhammad Alam, Michael Hafner, Ruth Breu A constraint based role based access control in the SECTET a model-driven approach. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF service oriented architectures, role based access control, model-driven architecture, model-driven security
71Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi Execution monitoring enforcement for limited-memory systems. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bounded history automata, enforcement mechanisms, locally-testable properties, security policies, execution monitoring, edit automata
71Walid Rjaibi Label-based access control (LBAC) in DB2 LUW. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Quan Zhou, Lin-gang Gu, Chong-Jun Wang, Jun Wang, Shifu Chen Using an improved C4.5 for imbalanced dataset of intrusion. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Ajith Kamath, Ramiro Liscano, Abdulmotaleb El-Saddik User-credential based role mapping in multi-domain environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Vic Chung Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF goal-oriented methodologies, healthcare privacy, healthcare security, system design, system analysis, conflicts of interest
71Scott Buffett, T. A. Kosa Towards a model for risk and consent management of personal health information. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Brian O'Higgins Deep packet inspection comes to the desktop. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Merv Matson, Mihaela Ulieru The 'how' and 'why' of persistent information security. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF avaliability, emergency response operations, information custodian, infosec, persistent information security, integrity, information security, confidentiality, digital rights management, DRM
71Anasuya Bulkan Is privacy an attainable goal?: a review of the privacy rights dilemma. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy contract, rights and ethics, policy
71Mustapha Refai Exploiting a buffer overflow using metasploit framework. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metasploit, framework, buffer overflow, exploit, buffer overrun
71Reid Kerr, Robin Cohen Modeling trust using transactional, numerical units. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF buying and selling, e-commerce marketplaces, multiagent systems, trust and reputation
70Rakib Ahmed, Gour C. Karmakar, Laurence S. Dooley Efficient Probabilistic Spatio-Temporal Video Object Segmentation. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF joint spatio-temporal, machine vision, video segmentation, Image sequence analysis
53Rakib Ahmed, Gour C. Karmakar, Laurence S. Dooley Incorporation of Texture Information for Joint Spatio-Temporal Probabilistic Video Object Segmentation. Search on Bibsonomy ICIP (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Michael P. Holmes, Charles Lee Isbell Jr. Looping suffix tree-based inference of partially observable hidden state. Search on Bibsonomy ICML The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
53Jingyi Yang, Jitender S. Deogun, Zhaohui Sun A New Scheme for Protein Sequence Motif Extraction. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Christopher Kermorvant, Pierre Dupont Improved Smoothing for Probabilistic Suffix Trees Seen as Variable Order Markov Chains. Search on Bibsonomy ECML The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
53Heng-Liang Huang, Yeong-Ren Chen, Jing-Yang Jou, Wen-Zen Shen Grouped input power sensitive transition an input sequence compaction technique for power estimation. Search on Bibsonomy ISCAS (5) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
43 20th Annual International Conference on Privacy, Security and Trust, PST 2023, Copenhagen, Denmark, August 21-23, 2023 Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Panyu Wu, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Yihao Yang, Jun Zhou 0018, Liming Fang 0001, Zhe Liu 0001, Chunpeng Ge, Chunhua Su MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Gaoning Pan, Tianxiang Luo, Yiming Tao, Xiao Lei, Shuangxi Chen, Hui Liu, Chunming Wu 0001 AMF: Efficient Browser Interprocess Communication Fuzzing. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Arnaud Grivet Sébert, Marina Checri, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler Combining homomorphic encryption and differential privacy in federated learning. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Atsuko Miyaji, Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita, Tomoaki Mimoto Re-visited Privacy-Preserving Machine Learning. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Alessandro Aldini, Suzana Mesquita de Borba Maranhão Moreno, Jean-Marc Seigneur A Rule-Language Tailored for Financial Inclusion and KYC/AML Compliance. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Masaya Kobayashi, Atsushi Fujioka, Koji Chida Extended km-Anonymity for Randomization Applied to Binary Data. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Benjamin Fenelon, Saeede Enayati, Hossein Pishro-Nik Private UAV-Assisted IoT Data Collection: An Energy-Privacy Trade-off. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Changjin Wang, Hamid R. Sharifzadeh, Soheil Varastehpour, Iman Ardekani Analysis and Comparison of Deepfakes Detection Methods for Cross-Library Generalisation. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Amani Mohammed Alqarni, Daniel Timko, Muhammad Lutfor Rahman Saudi Arabian Perspective of Security, Privacy, and Attitude of Using Facial Recognition Technology. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 941 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license