Thijs Veugen
Orcid: 0000-0002-9898-4698
According to our database1,
Thijs Veugen
authored at least 47 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2022
Accurate training of the Cox proportional hazards model on vertically-partitioned data while preserving privacy.
BMC Medical Informatics Decis. Mak., 2022
New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment.
J. Medical Syst., 2022
Proceedings of the Innovations for Community Services - 22nd International Conference, 2022
2021
Privacy-preserving dataset combination and Lasso regression for healthcare predictions.
BMC Medical Informatics Decis. Mak., 2021
Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
J. Medical Syst., 2020
Int. J. Appl. Cryptogr., 2020
2019
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer.
IACR Cryptol. ePrint Arch., 2019
Approximating Eigenvectors with Fixed-Point Arithmetic: A Step Towards Secure Spectral Clustering.
Proceedings of the Numerical Mathematics and Advanced Applications ENUMATH 2019 - European Conference, Egmond aan Zee, The Netherlands, September 30, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
A Quantum Algorithm for Minimising the Effective Graph Resistance upon Edge Addition.
Proceedings of the Quantum Technology and Optimization Problems, 2017
2016
Proceedings of the 24th European Signal Processing Conference, 2016
2015
A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE J. Sel. Top. Signal Process., 2015
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
2014
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014
2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013
2012
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing.
IEEE Trans. Inf. Forensics Secur., 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Multimedia and Security Workshop, 2012
2011
IEEE Trans. Inf. Theory, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011
2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Processing in the encrypted domain using a composite signal representation: Pros and cons.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
2007
Eur. Trans. Telecommun., 2007