Name
Affiliation
Papers
NATHALIE BARACALDO
University of Pittsburgh, Pittsburgh, PA, USA
30
Collaborators
Citations 
PageRank 
80
111
12.47
Referers 
Referees 
References 
402
459
190
Search Limit
100459
Title
Citations
PageRank
Year
DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting00.342022
TIFF: Tokenized Incentive for Federated Learning00.342022
Curse Or Redemption? How Data Heterogeneity Affects The Robustness Of Federated Learning00.342021
LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning00.342021
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data10.362021
The Design and Development of a Game to Study Backdoor Poisoning Attacks: The Backdoor Game00.342021
Accountable Federated Machine Learning in Government: Engineering and Management Insights00.342021
TiFL: A Tier-based Federated Learning System110.672020
Towards Privacy Preservation And Data Protection In Information System Design An Introduction To The Special Issue00.342020
Privacy-Preserving Process Mining - Differential Privacy for Event Logs.00.342019
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering.100.532019
User-Centered and Privacy-Driven Process Mining System Design for IoT.00.342019
G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework00.342019
A Hybrid Approach to Privacy-Preserving Federated Learning.280.882019
A Hybrid Approach to Privacy-Preserving Federated Learning: (Extended Abstract)20.362019
Privacy-preserving Process Mining: Differential00.342019
User Centered and Privacy-Driven Process Mining System Design00.342019
HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning120.542019
Detecting Poisoning Attacks on Machine Learning in IoT Environments30.392018
Rsla: An Approach For Managing Service Level Agreements In Cloud Environments00.342017
Mitigating Poisoning Attacks on Machine Learning Models: A Data Provenance Based Approach.30.432017
Data Provenance Model for Internet of Things (IoT) Systems.00.342016
Securing Data Provenance in Internet of Things (IoT) Systems.00.342016
Managing Service Quality at the Platform and Application Levels with rSLa00.342016
Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage30.422014
Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework.30.402014
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks40.412013
An adaptive risk management and access control framework to mitigate insider threats150.632013
A trust-and-risk aware RBAC framework: tackling insider threat120.592012
A secure, constraint-aware role-based access control interoperation framework.40.462011