Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OIDC-TCI: OIDC with Trust Context Information., , and . WMNC, page 54-61. IEEE, (2022)Using NLP and Machine Learning to Detect Data Privacy Violations., , , , and . INFOCOM Workshops, page 972-977. IEEE, (2020)Deep learning-based approaches for human motion decoding in smart walkers for rehabilitation., , , , , and . CoRR, (2023)Clinical Screening Prediction in the Portuguese National Health Service: Data Analysis, Machine Learning Models, Explainability and Meta-Evaluation., , , , , , , , , and 3 other author(s). Future Internet, 15 (1): 26 (2023)Using natural language processing to detect privacy violations in online contracts., , , , and . SAC, page 1305-1307. ACM, (2020)A federated authentication and authorization approach for IoT farming., , , and . Internet Things, (July 2023)FedAAA-SDN: Federated Authentication, Authorization and Accounting in SDN controllers., and . Comput. Networks, (February 2024)BIANFE: Object identification and authentication in federated scenarios., , and . CCNC, page 957-958. IEEE, (2022)Privacy risk assessment and privacy-preserving data monitoring., , , , and . Expert Syst. Appl., (2022)Clinical Trial Classification of SNS24 Calls with Neural Networks., , , , , , , , , and 2 other author(s). Future Internet, 14 (5): 130 (2022)