From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Secure Query Evaluation over Encrypted XML Databases., и . VLDB, стр. 127-138. ACM, (2006)Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations., , и . DBSec, том 10359 из Lecture Notes in Computer Science, стр. 311-324. Springer, (2017)Result Integrity Verification of Outsourced Frequent Itemset Mining., , и . DBSec, том 7964 из Lecture Notes in Computer Science, стр. 258-265. Springer, (2013)VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version)., , и . CoRR, (2021)Privacy-Preserving Data Sharing in Cloud Computing.. J. Comput. Sci. Technol., 25 (3): 401-414 (2010)A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks., , , и . EURASIP J. Wireless Comm. and Networking, (2010)CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security., , , , , и . RAID, стр. 205-219. ACM, (2021)Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy., , , , и . IEEE BigData, стр. 488-497. IEEE, (2018)Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data., , и . PSB, WorldScientific, (2021)Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems., , , , , , , и . CIKM, стр. 707-715. ACM, (2017)