Felix Morsbach

Felix Morsbach
Karlsruhe Institute of Technology | KIT · Institute of Applied Informatics and Formal Description Methods

Master of Science

About

4
Publications
356
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3
Citations
Introduction
Felix Morsbach currently works at the Institute of Applied Informatics and Formal Description Methods, Karlsruhe Institute of Technology. Felix does research on Privacy-Preserving Machine Learning, Automated Machine Learning and IT-Security Management.

Publications

Publications (4)
Preprint
Full-text available
Advanced programmatic hyperparameter optimization (HPO) methods, such as Bayesian optimization, have high sample efficiency in reproducibly finding optimal hyperparameter values of machine learning (ML) models. Yet, ML practitioners often apply less sample-efficient HPO methods, such as grid search, which often results in under-optimized ML models....
Chapter
Full-text available
One way to reduce privacy risks for consumers when using the internet is to inform them better about the privacy practices they will encounter. Tailored privacy information provision could outperform the current practice where information system providers do not much more than posting unwieldy privacy notices. Paradoxically, this would require addi...
Conference Paper
Full-text available
One barrier to more widespread adoption of differentially private neural networks is the entailed accuracy loss. To address this issue, the relationship between neural network architectures and model accuracy under differential privacy constraints needs to be better understood. As a first step, we test whether extant knowledge on architecture desig...
Preprint
Full-text available
One barrier to more widespread adoption of differentially private neural networks is the entailed accuracy loss. To address this issue, the relationship between neural network architectures and model accuracy under differential privacy constraints needs to be better understood. As a first step, we test whether extant knowledge on architecture desig...

Network

Cited By