Milan Petkovic

Affiliations:
  • Eindhoven University of Technology, Netherlands


According to our database1, Milan Petkovic authored at least 84 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Generating High-Resolution 3D Faces and Bodies Using VQ-VAE-2 with PixelSNAIL Networks on 2D Representations.
Sensors, February, 2023

Schema-Driven Actionable Insight Generation and Smart Recommendation.
CoRR, 2023

Tracking of Nutritional Intake Using Artificial Intelligence.
Proceedings of the Caring is Sharing - Exploiting the Value in Data for Health and Innovation - Proceedings of MIE 2023, Gothenburg, Sweden, 22, 2023

Smart Selection of Useful Insights from Wearables.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Editorial: AI in Healthcare: From Data to Intelligence.
Frontiers Artif. Intell., 2022

A robust model selection framework for fault detection and system health monitoring with limited failure examples: Heterogeneous data fusion and formal sensitivity bounds.
Eng. Appl. Artif. Intell., 2022

Generating High-Resolution 3D Faces Using VQ-VAE-2 with PixelSNAIL Networks.
Proceedings of the Image Analysis and Processing. ICIAP 2022 Workshops, 2022

2021
Neural Scoring of Logical Inferences from Data using Feedback.
Int. J. Interact. Multim. Artif. Intell., 2021

Towards Effective Patient Simulators.
Frontiers Artif. Intell., 2021

Autoencoders as Tools for Program Synthesis.
CoRR, 2021

BF++: a language for general-purpose neural program synthesis.
CoRR, 2021

A latent space exploration for microscopic skin lesion augmentations with VQ-VAE-2 and PixelSNAIL.
Proceedings of the Medical Imaging 2021: Image Processing, Online, February 15-19, 2021, 2021

Neurogenetic programming framework for explainable reinforcement learning.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

2020
Towards a Generalised Framework for Behaviour Insight Mining (short paper).
Proceedings of the First Workshop on Smart Personal Health Interfaces co-located with 25th International Conference on Intelligent User Interfaces, 2020

Don't Tear Your Hair Out: Analysis of the Impact of Skin Hair on the Diagnosis of Microscopic Skin Lesions.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Improving Spare Part Search for Maintenance Services using Topic Modelling.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020

2019
Artificial Intelligence in Clinical Health Care Applications: Viewpoint.
CoRR, 2019


2018
Deep Learning in Information Security.
CoRR, 2018

Deep Metric Learning for Sequential Data Using Approximate Information.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2018

2017
A white-box anomaly-based framework for database leakage detection.
J. Inf. Secur. Appl., 2017

Unsupervised Signature Extraction from Forensic Logs.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

2016
A severity-based quantification of data leakages in database systems.
J. Comput. Secur., 2016

Towards Creating Believable Decoy Project Folders for Detecting Data Theft.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Role Mining with Missing Values.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
An anomaly analysis framework for database systems.
Comput. Secur., 2015

Understanding Perceived Trust to Reduce Regret.
Comput. Intell., 2015

Secure distributed key generation in attribute based encryption systems.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2014
A reference model for reputation systems.
Decis. Support Syst., 2014

AU2EU: Privacy-Preserving Matching of DNA Sequences.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Data Leakage Quantification.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Hunting the Unknown - White-Box Database Leakage Detection.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Database Anomalous Activities - Detection and Quantification.
Proceedings of the SECRYPT 2013, 2013

Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

Data reliability in home healthcare services.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
A machine learning solution to assess privacy policy completeness: (short paper).
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Towards Trustworthy Health Platform Cloud.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

eConsent Management and Enforcement in Personal Telehealth.
Proceedings of the ISSE 2012, 2012

Impact of ICT on Home Healthcare.
Proceedings of the ICT Critical Infrastructures and Society, 2012

What Websites Know About You.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Measuring Privacy Compliance Using Fitness Metrics.
Proceedings of the Business Process Management - 10th International Conference, 2012

Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption.
Proceedings of the Seventh International Conference on Availability, 2012

2011
On-line trust perception: What really matters.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Purpose Control: Did You Process the Data for the Intended Purpose?
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

Personal Health Data: Patient Consent in Information Age.
Proceedings of the User Centered Networked Health Care - Proceedings of MIE 2011, 2011

End-to-End Security for Personal Telehealth.
Proceedings of the User Centered Networked Health Care - Proceedings of MIE 2011, 2011

Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme.
Proceedings of the Communications and Multimedia Security, 2011

An interoperable security framework for connected healthcare.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

A Home Healthcare System in the Cloud-Addressing Security and Privacy Challenges.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Towards Data Protection Compliance.
Proceedings of the SECRYPT 2010, 2010

An Encryption Scheme for a Secure Policy Updating.
Proceedings of the SECRYPT 2010, 2010

2009
Preface.
J. Comput. Secur., 2009

Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Emergency Access to Protected Health Records.
Proceedings of the Medical Informatics in a United and Healthy Europe - Proceedings of MIE 2009, The XXIInd International Congress of the European Federation for Medical Informatics, Sarajevo, Bosnia and Herzegovina, August 30, 2009

2008
Efficient key management for cryptographically enforced access control.
Comput. Stand. Interfaces, 2008

Reliable Personal Health Records.
Proceedings of the eHealth Beyond the Horizon, 2008

Rights Management for Role-Based Access Control.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

Privacy-Preserving Recommendation Systems for Consumer Healthcare Services.
Proceedings of the The Third International Conference on Availability, 2008

2007
Hedaquin: A Reputation-based Health Data Quality Indicator.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

A Key Management Method for Cryptographically Enforced Access Control.
Proceedings of the Security in Information Systems, 2007

Rights Management Technologies: A Good Choice for Securing Electronic Health Records?
Proceedings of the ISSE/SECURE 2007, 2007

The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers.
Proceedings of the Data and Applications Security XXI, 2007

Digital Inheritance of Personal and Commercial Content Using DRM.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

A Spatio-Temporal and a Probabilistic Approach for Video Retrieval.
Proceedings of the Multimedia Retrieval, 2007

Privacy and Security Issues in a Digital World.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Enhancing Privacy for Digital Rights Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Multimodal Content-based Video Retrieval.
Proceedings of the Multimedia Retrieval, 2007

DRM for Protecting Personal Content.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Controlled Sharing of Personal Content Using Digital Rights Management.
J. Res. Pract. Inf. Technol., 2006

Cryptographically Enforced Personalized Role-Based Access Control.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

2005
User-Attributed Rights in DRM.
Proceedings of the Digital Rights Management: Technologies, 2005

2004
Integrated use of different content derivation techniques within a multimedia database management system.
J. Vis. Commun. Image Represent., 2004

Privacy-Preserving Digital Rights Management.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

2003
Techniques for automatic video content derivation.
Proceedings of the 2003 International Conference on Image Processing, 2003

Content-Based Video Retrieval - A Database Perspective.
Multimedia systems and applications 25, Springer, ISBN: 978-1-4419-5396-4, 2003

2002
Multi-modal extraction of highlights from TV Formula 1 programs.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Content-Based Video Indexing for the Support of Digital Library Search.
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002

Extending a DBMS to Support Content-Based Video Retrieval: A Formula 1 Case Study.
Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002

Cobra: A Content-Based Video Retrieval System.
Proceedings of the Advances in Database Technology, 2002

2001
Flexible and scalable digital library search.
Proceedings of the VLDB 2001, 2001

Recognizing Strokes in Tennis Videos using Hidden Markov Models.
Proceedings of the IASTED International Conference on Visualization, 2001

Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events.
Proceedings of the IEEE Workshop on Detection and Recognition of Events in Video, 2001

2000
Content-based Video Retrieval.
Proceedings of the 7th EDBT 2000 PhD Workshop, March 31 - April 1, 2000. Konstanz, Germany, 2000


  Loading...