Alberto Blanco-Justicia

Orcid: 0000-0002-1108-8082

According to our database1, Alberto Blanco-Justicia authored at least 30 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Fair detection of poisoning attacks in federated learning on non-i.i.d. data.
Data Min. Knowl. Discov., September, 2023

Secure, accurate and privacy-aware fully decentralized learning via co-utility.
Comput. Commun., July, 2023

A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning.
ACM Comput. Surv., 2023

An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census Microdata.
CoRR, 2023

2022
Secure and Privacy-Preserving Federated Learning via Co-Utility.
IEEE Internet Things J., 2022

GRAIMATTER Green Paper: Recommendations for disclosure control of trained Machine Learning (ML) models from Trusted Research Environments (TREs).
CoRR, 2022

Enhanced Security and Privacy via Fragmented Federated Learning.
CoRR, 2022

Defending against the Label-flipping Attack in Federated Learning.
CoRR, 2022

Generation of Synthetic Trajectory Microdata from Language Models.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022

2021
Achieving security and privacy in federated learning systems: Survey, research challenges and future directions.
Eng. Appl. Artif. Intell., 2021

The limits of differential privacy (and its misuse in data release and machine learning).
Commun. ACM, 2021

Towards Machine Learning-Assisted Output Checking for Statistical Disclosure Control.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2021

2020
Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph.
Sci. Eng. Ethics, 2020

Machine learning explainability via microaggregation and shallow decision trees.
Knowl. Based Syst., 2020

Detecting Bad Answers in Survey Data Through Unsupervised Machine Learning.
Proceedings of the Privacy in Statistical Databases, 2020

Efficient Detection of Byzantine Attacks in Federated Learning Using Last Layer Biases.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2020

Privacy-Preserving Computation of the Earth Mover's Distance.
Proceedings of the Information Security - 23rd International Conference, 2020

Fair Detection of Poisoning Attacks in Federated Learning.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

Co-Utile Peer-to-Peer Decentralized Computing.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

2019
Collaborative Explanation of Deep Models with Limited Interaction for Trade Secret and Privacy Preservation.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Machine Learning Explainability Through Comprehensible Decision Trees.
Proceedings of the Machine Learning and Knowledge Extraction, 2019

2018
Dynamic group size accreditation and group discounts preserving anonymity.
Int. J. Inf. Sec., 2018

Efficient privacy-preserving implicit authentication.
Comput. Commun., 2018

2017
Cryptographic protocols for privacy-aware and secure e-commerce.
PhD thesis, 2017

2016
Privacy-aware loyalty programs.
Comput. Commun., 2016

2015
Flexible and Robust Privacy-Preserving Implicit Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
Distance Computation between Two Private Preference Functions.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Group Discounts Compatible with Buyer Privacy.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Privacy-Preserving Loyalty Programs.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013


  Loading...