-
Ethical Value Centric Cybersecurity. A Methodology Based on a Value Graph
Our society is being shaped in a non-negligible way by the tech- nological advances of recent years, especially in information and communi- cations technologies (ICTs). The... -
Machine Learning Explainability Via Microaggregation and Shallow Decision Trees
Artificial intelligence (AI) is being deployed in missions that are increasingly critical for human life. To build trust in AI and avoid an algorithm-based authoritarian... -
Explanation of Deep Models with Limited Interaction for Trade Secret and Priv...
An ever increasing number of decisions affecting our lives are made by algorithms. For this reason, algorithmic transparency is becoming a pressing need: automated decisions... -
Accountability for the Use of Algorithms in a Big Data Environment
Accountability is the ability to provide good reasons in order to explain and to justify actions, decisions, and policies for a (hypothetical) forum of persons or... -
Privacy in the clouds
Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by... -
Fair detection of poisoning attacks in federated learning
Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Machine Learning Explainability Through Comprehensible Decision Trees
The role of decisions made by machine learning algorithms in our lives is ever increasing. In reaction to this phenomenon, the European General Data Protection Regulation... -
Privacy Risk on Sociometer
This method provides a Privacy Risk Assessment on CDR data, aggregated through the presence vectors used by the Sociometer. -
Information Technology Privacy and the Protection of Personal Data
Information technology allows us to generate, store, and process huge quantities of data. Search engines, satellites, sensor networks, scientists, security agencies,... -
Human Mobility Data Privacy Risk Estimator
This method is a fast and flexible approach to estimate privacy risk in human mobility data. The idea is to train classifiers to capture the relation between individual... -
Privacy Risk on Trajectories
This method provides a Privacy Risk Assessment on mobility data, in terms of trajectories or aggregation of trajectories, i.e., locations with frequency of visit and locations...-
Python
The resource: 'privacy-lib' is not accessible as guest user. You must login to access it!
-
Python
-
-
HTML
The resource: 'Unnamed resource' is not accessible as guest user. You must login to access it!
-
HTML
-
Second SoBigData Plus Plus Awareness Panel R. I. Platforms Data Protection an...
Research Infrastructure and Data protection-
HTML
The resource: 'Second SoBigData++ ...' is not accessible as guest user. You must login to access it!
-
HTML
-
Second SoBigData Plus Plus Awareness Panel R. I. Platforms Data Protection an...
Data Protection and Research-
HTML
The resource: 'Second SoBigData++ ...' is not accessible as guest user. You must login to access it!
-
HTML
-
Scikit-mobility
Scikit-mobility is a library for human mobility analysis in Python. The library allows to: represent trajectories and mobility flows with proper data structures, TrajDataFrame... -
Private Another testing method