Related references
Note: Only part of the references are listed.An approach towards missing data management using improved GRNN-SGTM ensemble method
Ivan Izonin et al.
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH (2021)
Open-Source Federated Learning Frameworks for IoT: A Comparative Review and Analysis
Ivan Kholod et al.
SENSORS (2021)
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric
Charalampos Stamatellis et al.
SENSORS (2020)
Privacy-Preserving Passive DNS
Pavlos Papadopoulos et al.
COMPUTERS (2020)
Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion
Fennie Wang et al.
FRONTIERS IN BLOCKCHAIN (2020)
Barriers and pitfalls for artificial intelligence in gastroenterology: Ethical and regulatory issues
Omer F. Ahmad et al.
TECHNIQUES AND INNOVATIONS IN GASTROINTESTINAL ENDOSCOPY (2020)
Privacy-Preserving Machine Learning: Threats and Solutions
Mohammad Al-Rubaie et al.
IEEE SECURITY & PRIVACY (2019)
Causability and explainability of artificial intelligence in medicine
Andreas Holzinger et al.
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2019)
Adversarial Examples: Attacks and Defenses for Deep Learning
Xiaoyong Yu et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2019)
A taxonomy and survey of attacks against machine learning
Nikolaos Pitropakis et al.
COMPUTER SCIENCE REVIEW (2019)
Docker ecosystem - Vulnerability Analysis
A. Martin et al.
COMPUTER COMMUNICATIONS (2018)
Performance comparison of intrusion detection systems and application of machine learning to Snort system
Syed Ali Raza Shah et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Pursuing consumer empowerment in the age of big data: A comprehensive regulatory framework for data brokers
Chih-Liang Yeh
TELECOMMUNICATIONS POLICY (2018)
A First Look at Identity Management Schemes on the Blockchain
Paul Dunphy et al.
IEEE SECURITY & PRIVACY (2018)
A survey of deep neural network architectures and their applications
Weibo Liu et al.
NEUROCOMPUTING (2017)
Google DeepMind and healthcare in an age of algorithms
Julia Powles et al.
HEALTH AND TECHNOLOGY (2017)
Privacy Engineering: Shaping an Emerging Field of Research and Practice
Seda Guerses et al.
IEEE SECURITY & PRIVACY (2016)
The Algorithmic Foundations of Differential Privacy
Cynthia Dwork et al.
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE (2013)
The architecture of virtual machines
JE Smith et al.
COMPUTER (2005)
A conceptualization of trust in international relations
AM Hoffman
EUROPEAN JOURNAL OF INTERNATIONAL RELATIONS (2002)