Wilko Henecka

Orcid: 0000-0003-2344-0140

According to our database1, Wilko Henecka authored at least 16 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
The Impact of Record Linkage on Learning from Feature Partitioned Data.
Proceedings of the 38th International Conference on Machine Learning, 2021

2020
Boosted and Differentially Private Ensembles of Decision Trees.
CoRR, 2020

Hyper-Parameter Optimization for Privacy-Preserving Record Linkage.
Proceedings of the ECML PKDD 2020 Workshops, 2020

P-Signature-Based Blocking to Improve the Scalability of Privacy-Preserving Record Linkage.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

Fairness-Aware Privacy-Preserving Record Linkage.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

A Measure of Personal Information in Mobile Data.
Proceedings of the 2nd 6G Wireless Summit, 2020

2018
Entity Resolution and Federated Learning get a Federated Resolution.
CoRR, 2018

2017
Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption.
CoRR, 2017

2015
Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases.
IEEE Trans. Dependable Secur. Comput., 2015

Lossy Compression of Dynamic, Weighted Graphs.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

2013
STRIP: Privacy-preserving vector-based routing.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Faster secure two-party computation with less memory.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2010
TASTY: Tool for Automating Secure Two-partY computations.
IACR Cryptol. ePrint Arch., 2010

Correcting Errors in RSA Private Keys.
Proceedings of the Advances in Cryptology, 2010

2009
Automatic Generation of Sigma-Protocols.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009


  Loading...