Follow
Peter Kieseberg
Title
Cited by
Cited by
Year
Explainable AI: the new 42?
R Goebel, A Chander, K Holzinger, F Lecue, Z Akata, S Stumpf, ...
International cross-domain conference for machine learning and knowledge …, 2018
4252018
Current advances, trends and challenges of machine learning and knowledge extraction: from machine learning to explainable AI
A Holzinger, P Kieseberg, E Weippl, AM Tjoa
Machine Learning and Knowledge Extraction: Second IFIP TC 5, TC 8/WG 8.4, 8 …, 2018
2742018
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
2702010
Humans Forget, Machines Remember: Artificial Intelligence and the Right to Be Forgotten
E Fosch Villaronga, P Kieseberg, T Li
Computer Law & Security Review, 2017
209*2017
Explainable artificial intelligence: Concepts, applications, research challenges and visions
L Longo, R Goebel, F Lecue, P Kieseberg, A Holzinger
International cross-domain conference for machine learning and knowledge …, 2020
1772020
Guess who is texting you? evaluating the security of smartphone messaging applications
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
1582012
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
1462014
Towards the augmented pathologist: Challenges of explainable-ai in digital pathology
A Holzinger, B Malle, P Kieseberg, PM Roth, H Müller, R Reihs, ...
arXiv preprint arXiv:1712.06657, 2017
932017
Digital transformation for sustainable development goals (SDGs)-a security, safety and privacy perspective on AI
A Holzinger, E Weippl, AM Tjoa, P Kieseberg
International cross-domain conference for machine learning and knowledge …, 2021
802021
Data confidentiality using fragmentation in cloud computing
A Hudic, S Islam, P Kieseberg, S Rennert, ER Weippl
International Journal of Pervasive Computing and Communications 9 (1), 37-51, 2013
662013
Innodb database forensics: Reconstructing data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
2012 Seventh International Conference on Availability, Reliability and …, 2012
602012
k-Anonymity in practice: How generalisation and suppression affect machine learning classifiers
D Slijepčević, M Henzl, LD Klausner, T Dam, P Kieseberg, M Zeppelzauer
Computers & Security 111, 102488, 2021
512021
The right to be forgotten: towards machine learning on perturbed knowledge bases
B Malle, P Kieseberg, E Weippl, A Holzinger
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2016
502016
Machine learning and knowledge extraction in digital pathology needs an integrative approach
A Holzinger, B Malle, P Kieseberg, PM Roth, H Müller, R Reihs, ...
Towards Integrative Machine Learning and Knowledge Extraction, 13-50, 2017
482017
Comparing blockchain standards and recommendations
L König, Y Korobeinikova, S Tjoa, P Kieseberg
Future Internet 12 (12), 222, 2020
452020
On reconnaissance with IPv6: a pattern-based scanning approach
J Ullrich, P Kieseberg, K Krombholz, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
452015
Can we trust Machine Learning Results? Artificial Intelligence in Safety-Critical decision Support
K Holzinger, K Mak, P Kieseberg, A Holzinger
ERCIM NEWS, 42-43, 2018
412018
A tamper-proof audit and control system for the doctor in the loop
P Kieseberg, B Malle, P Frühwirt, E Weippl, A Holzinger
Brain Informatics 3, 269-279, 2016
412016
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations
P Frühwirt, P Kieseberg, K Krombholz, E Weippl
Digital Investigation 11 (4), 336-348, 2014
402014
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
Information Security Technical Report 17 (4), 227-238, 2013
402013
The system can't perform the operation now. Try again later.
Articles 1–20