Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…Compliance with privacy regulations to prevent attacks has also gained interest, and many approaches have been developed to suggest solutions [18][19][20][21][22][23][24]. Challenges and opportunities for genomics data sharing is explored in [25].…”
Section: Privacy Attacks Toward Machine Learning Models Related Workmentioning
confidence: 99%
“…Compliance with privacy regulations to prevent attacks has also gained interest, and many approaches have been developed to suggest solutions [18][19][20][21][22][23][24]. Challenges and opportunities for genomics data sharing is explored in [25].…”
Section: Privacy Attacks Toward Machine Learning Models Related Workmentioning
confidence: 99%
“…More recent applications of provenance include its use in system security, including visualization and explanation of software faults, intrusion detection, and compliance with regulations involving protection of personal data. 7 A thorough review of these topics will be part of a future paper in Patterns , and all packages discussed are available from https://end-to-end-provenance.github.io/ .…”
Section: Main Textmentioning
confidence: 99%