Author of the publication

Beyond federated learning: On confidentiality-critical machine learning applications in industry

, , , , , , , , and . Procedia Computer Science, (2021)Proceedings of the 2nd International Conference on Industry 4.0 and Smart Manufacturing (ISM 2020).
DOI: https://doi.org/10.1016/j.procs.2021.01.296

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Deep Learning Architectures for Complex Immunofluorescence Nuclear Image Segmentation., , , , , , , , and . IEEE Trans. Medical Imaging, 40 (7): 1934-1949 (2021)AI System Engineering - Key Challenges and Lessons Learned., , , , , , , , and . Mach. Learn. Knowl. Extr., 3 (1): 56-83 (2021)Twenty Years of Successful Translational Research: A Case Study of Three COMET Centers., , , , , , and . DEXA Workshops, volume 1633 of Communications in Computer and Information Science, page 155-166. Springer, (2022)Beyond federated learning: On confidentiality-critical machine learning applications in industry., , , , , , , , and . ISM, volume 180 of Procedia Computer Science, page 734-743. Elsevier, (2020)Kernel Affine Hull Machines for Differentially Private Learning., , and . CoRR, (2023)Beyond federated learning: On confidentiality-critical machine learning applications in industry, , , , , , , , and . Procedia Computer Science, (2021)DeepSNP: An End-to-End Deep Neural Network with Attention-Based Localization for Breakpoint Detection in Single-Nucleotide Polymorphism Array Genomic Data., , , , , , , , , and 1 other author(s). J. Comput. Biol., 26 (6): 572-596 (2019)Nunc profana tractemus. Detecting Code-Switching in a Large Corpus of 16th Century Letters., , , , , , and . LREC, page 2901-2908. European Language Resources Association, (2022)Membership-Mappings for Practical Secure Distributed Deep Learning., , , and . CoRR, (2022)Towards Practical Secure Privacy-Preserving Machine (Deep) Learning with Distributed Data., , , and . DEXA Workshops, volume 1633 of Communications in Computer and Information Science, page 55-66. Springer, (2022)