Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Dali Kaafar
Professor, Executive Director, Research Group Director Faculty of Science and Engineering …
Verified email at mq.edu.au
Cited by 7375
Privacy-preserving technologies
Cyber Security
Machine learning
Information Security
Measurement and Modeling
Kwok-Yan Lam
Nanyang Technological University
Verified email at ntu.edu.sg
Cited by 6961
Cybersecurity
Privacy-Preserving technologies
Digital Trust
Distributing systems
LegalTech
Alex Nayshtut
BSc. Information Systems Engineering
Verified email at cellebrite.com
Cited by 2000
cybersecurity
privacy preserving technologies
confidential computing
AI/ML security
Bahattin Yildiz
LG Electronics
Verified email at lge.com
Cited by 1790
Cryptography
Homomorphic Encryption
Post-quantum Cryptography
Privacy Preserving Technologies
Shubham Jain
Ph.D. Student, Imperial College London
Verified email at imperial.ac.uk
Cited by 1752
Privacy-Preserving Technologies
Fairness
Deep Learning
Sin G. Teo
Institute for Infocomm Research
Verified email at i2r.a-star.edu.sg
Cited by 891
Applied cryptography
data privacy and security
privacy-preserving technologies
deep learning
malware detection and classific
Rahat Masood
Lecturer, UNSW Sydney
Verified email at unsw.edu.au
Cited by 859
Privacy Preserving Technologies
Network Security
Usable Privacy
Abelino Jimenez
Verified email at linkedin.com
Cited by 548
Machine Learning
Signal Processing
Privacy Preserving Technologies
Shekha Chenthara
Research Scholar
Verified email at live.vu.edu.au
Cited by 472
Cyber Security
Cloud security
Data security
Privacy Preserving Technologies
Blockchain
Jayant Kolhe
Cited by 383
Compilers
GPGPU
Privacy Preserving technologies
Networking
RPC
1 - 10
Privacy
Terms
Help
About Scholar
Search help