PaperPrivacy-Preserving Process Mining: Differential Privacy for Event LogsFelix Mannhardt, Agnes Koschmider, et al.BISE
Conference paperMitigating poisoning atacks on machine learning models: A data provenance based approachNathalie Baracaldo, Bryant Chen, et al.AISec 2017
Conference paperTowards taming the resource and data heterogeneity in federated learningZheng Chai, Hannan Fayyaz, et al.OpML 2019