Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel image encryption algorithm based on coupled map lattices model., , and . Multim. Tools Appl., 83 (4): 11557-11572 (January 2024)Confidential machine learning on untrusted platforms: a survey., and . Cybersecur., 4 (1): 30 (2021)Disguised-Nets: Image Disguising for Privacy-preserving Deep Learning., and . CoRR, (2019)Scalable Sequence Clustering for Large-Scale Immune Repertoire Analysis., , , , and . IEEE BigData, page 1349-1358. IEEE, (2021)Privacy-Preserving Boosting with Random Linear Classifiers., and . ACM Conference on Computer and Communications Security, page 2294-2296. ACM, (2018)Multi-region Coverage Path Planning for Heterogeneous Unmanned Aerial Vehicles Systems., , , and . SOSE, IEEE, (2019)SPIN: cleaning, monitoring, and querying image streams generated by ground-based telescopes for space situational awareness., , , and . Int. J. Data Sci. Anal., 5 (2-3): 155-167 (2018)DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds., , and . ACM Trans. Internet Techn., 23 (3): 47:1-47:26 (August 2023)Knowledge Graph Enhanced Community Detection and Characterization., , , , , , and . WSDM, page 51-59. ACM, (2019)Shilling attack based on item popularity and rated item correlation against collaborative filtering., , , and . Int. J. Machine Learning & Cybernetics, 10 (7): 1833-1845 (2019)