- document
- de Boer, M.H.T. (author), Vethman, S. (author), Bakker, R.M. (author), Adhikari, A. (author), Marcus, M.J.H. (author), de Greeff, J. (author), van der Waa1, J. (author), Schoonderwoerd, T.A.J. (author), Tolios, I. (author), van Zoelen, E.M. (author), Hillerström, F.H.J. (author), Kamphorst, B.J. (author) conference paper 2022
- document
-
Veugen, P.J.M. (author), Kamphorst, B. (author), Marcus, M.J.H. (author)We present the first algorithm that combines privacy-preserving technologies and state-of-the-art explainable AI to enable privacy-friendly explanations of black-box AI models. We provide a secure algorithm for contrastive explanations of black-box machine learning models that securely trains and uses local foil trees. Our work shows that the...conference paper 2022
- document
-
Attema, T. (author), Gervasoni, N. (author), Marcus, M.J.H. (author), Spini, G. (author)The advent of a full-scale quantum computer will severely impact most currently-used cryptographic systems. The most well-known aspect of this impact lies in the computational-hardness assumptions that underpin the security of most current public-key cryptographic systems: a quantum computer can factor integers and compute discrete logarithms in...article 2021
- document
- Attema, T. (author), Gervasoni, N. (author), Marcus, M.J.H. (author), Spini, G. (author) article 2021