Abigail Goldsteen

According to our database1, Abigail Goldsteen authored at least 19 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dicing with data: the risks, benefits, tensions and tech of health data in the iToBoS project.
Frontiers Digit. Health, 2024

Membership Inference Attacks Against Time-Series Models.
CoRR, 2024

Is My Data in Your Retrieval Database? Membership Inference Attacks Against Retrieval Augmented Generation.
CoRR, 2024

SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks.
CoRR, 2024

2023
AI privacy toolkit.
SoftwareX, May, 2023

Improved Membership Inference Attacks Against Language Classification Models.
CoRR, 2023

2022
Data minimization for GDPR compliance in machine learning models.
AI Ethics, 2022

An end-to-end framework for privacy risk assessment of AI models.
Proceedings of the SYSTOR '22: The 15th ACM International Systems and Storage Conference, Haifa, Israel, June 13, 2022

Applying Artificial Intelligence Privacy Technology in the Healthcare Domain.
Proceedings of the Challenges of Trustable AI and Added-Value on Health, 2022

2021
Anonymizing Machine Learning Models.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

2020
Reducing Risk of Model Inversion Using Privacy-Guided Training.
CoRR, 2020

2019
Forgotten @ Scale: A Practical Solution for Implementing the Right To Be Forgotten in Large-Scale Systems.
CoRR, 2019

2017
Brief Announcement: A Consent Management Solution for Enterprises.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2016
Supporting Coordinated Maintenance of System Trustworthiness and User Trust at Runtime.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

2015
Application-Screen Masking: A Hybrid Approach.
IEEE Softw., 2015

Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015.
CoRR, 2015

A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime.
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015

Cyber-Physical Systems Design for Runtime Thrustworthiness Maintenance Supported by Tools.
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015

Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015


  Loading...