Legal aspects of data cleansing in medical AI | 1 | 0.35 | 2021 |
Secure Internal Data Markets | 0 | 0.34 | 2021 |
k -Anonymity in practice: How generalisation and suppression affect machine learning classifiers | 0 | 0.34 | 2021 |
KANDINSKY Patterns: A Swiss-Knife for the Study of Explainable AI. | 0 | 0.34 | 2020 |
Explainable Artificial Intelligence - Concepts, Applications, Research Challenges and Visions. | 5 | 0.49 | 2020 |
Distortion in Real-World Analytic Processes. | 0 | 0.34 | 2019 |
Towards Data Anonymization In Data Mining Via Meta-Heuristic Approaches | 0 | 0.34 | 2019 |
The Need for Speed of AI Applications: Performance Comparison of Native vs. Browser-based Algorithm Implementations. | 1 | 0.35 | 2018 |
Can we Trust Machine Learning Results? Artificial Intelligence in Safety-Critical Decision Support. | 2 | 0.39 | 2018 |
Security Challenges in Cyber-Physical Production Systems. | 0 | 0.34 | 2018 |
Humans Forget, Machines Remember: Artificial Intelligence and the Right to Be Forgotten | 5 | 0.51 | 2018 |
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. | 1 | 0.35 | 2018 |
Structural Limitations of B+-Tree forensics. | 0 | 0.34 | 2018 |
Explainable AI: The New 42? | 3 | 0.43 | 2018 |
A Machine Learning Approach for Privacy-preservation in E-business Applications. | 0 | 0.34 | 2018 |
Real-Time Forensics Through Endpoint Visibility | 0 | 0.34 | 2017 |
The More the Merrier - Federated Learning from Local Sphere Recommendations. | 2 | 0.38 | 2017 |
Privacy By Design Data Exchange Between Csirts | 0 | 0.34 | 2017 |
Security Testing for Mobile Applications. | 0 | 0.34 | 2017 |
DO NOT DISTURB? Classifier Behavior on Perturbed Datasets. | 1 | 0.35 | 2017 |
Interactive Anonymization for Privacy aware Machine Learning. | 0 | 0.34 | 2017 |
Trend Analysis of Underground Marketplaces. | 0 | 0.34 | 2017 |
Towards the Augmented Pathologist: Challenges of Explainable-AI in Digital Pathology. | 5 | 0.47 | 2017 |
Forensics using Internal Database Structures. | 0 | 0.34 | 2017 |
Trust for the "Doctor in the Loop". | 0 | 0.34 | 2016 |
Detection of Data Leaks in Collaborative Data Driven Research. | 0 | 0.34 | 2016 |
Privacy Aware Machine Learning and the "Right to be Forgotten". | 2 | 0.37 | 2016 |
A tamper-proof audit and control system for the doctor in the loop. | 2 | 0.37 | 2016 |
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases. | 5 | 0.46 | 2016 |
Security tests for mobile applications — Why using TLS/SSL is not enough | 1 | 0.37 | 2015 |
Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems | 0 | 0.34 | 2015 |
A Structured Approach to Defence Simulation Training. | 0 | 0.34 | 2015 |
Security And Privacy Of Smartphone Messaging Applications | 3 | 0.44 | 2015 |
Privacy and data protection in smartphone messengers. | 1 | 0.35 | 2015 |
Machine Learning and Knowledge Extraction in Digital Pathology Needs an Integrative Approach | 1 | 0.36 | 2015 |
CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism. | 0 | 0.34 | 2015 |
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach | 7 | 0.57 | 2015 |
Witnesses for the Doctor in the Loop | 6 | 0.51 | 2015 |
Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding. | 0 | 0.34 | 2015 |
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. | 3 | 0.48 | 2014 |
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. | 7 | 0.50 | 2014 |
E-voting Authentication with QR-codes | 2 | 0.41 | 2014 |
What'S New With Whatsapp & Co.? Revisiting The Security Of Smartphone Messaging Applications | 3 | 0.55 | 2014 |
Covert Computation - Hiding code in code through compile-time obfuscation. | 4 | 0.41 | 2014 |
QR Code Security: A Survey of Attacks and Challenges for Usable Security | 12 | 0.83 | 2014 |
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. | 0 | 0.34 | 2014 |
AES-SEC: Improving Software Obfuscation through Hardware-Assistance | 2 | 0.39 | 2014 |
Genie in a Model? Why Model Driven Security will not secure your Web Application. | 0 | 0.34 | 2014 |
Quantifying Windows File Slack Size and Stability. | 1 | 0.48 | 2013 |
Covert computation: hiding code in code for obfuscation purposes | 5 | 0.52 | 2013 |