Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Subspace Segmentation by Simultaneously Learning Data Representations and Their Affinity Matrix.. IJCAI, page 3547-3553. AAAI Press, (2015)Embracing Uncertainty: Adaptive Vague Preference Policy Learning for Multi-round Conversational Recommendation., , , , , , , , , and . CoRR, (2023)Automated Code generation for Information Technology Tasks in YAML through Large Language Models., , , , , , , , , and 1 other author(s). CoRR, (2023)Hierarchical Image Peeling: A Flexible Scale-space Filtering Framework., , , , , and . CoRR, (2021)Fixing Issues and Achieving Maliciously Secure Verifiable Aggregation in "VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning".. IACR Cryptol. ePrint Arch., (2022)Half-Tree: Halving the Cost of Tree Expansion in COT and DPF., , , , , , and . IACR Cryptol. ePrint Arch., (2022)VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Multi-exposure image fusion via deep perceptual enhancement., , , and . Inf. Fusion, (2022)Low-Rank Matrix Recovery Via Robust Outlier Estimation., and . IEEE Trans. Image Process., 27 (11): 5316-5327 (2018)Secure Aggregation is Insecure: Category Inference Attack on Federated Learning., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 147-160 (2023)