PaperPrivacy-Preserving Process Mining: Differential Privacy for Event LogsFelix Mannhardt, Agnes Koschmider, et al.BISE
Conference paperThe Design and Development of a Game to Study Backdoor Poisoning Attacks: The Backdoor GameZahra Ashktorab, Casey Dugan, et al.IUI 2021
Conference paperDetecting poisoning attacks on machine learning in IoT environmentsNathalie Baracaldo, Bryant Chen, et al.ICIOT 2018
Conference paperMitigating poisoning atacks on machine learning models: A data provenance based approachNathalie Baracaldo, Bryant Chen, et al.AISec 2017