Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Encrypted Data Management Systems with tunable Privacy.. Duke University, Durham, NC, USA, (2023)base-search.net (ftdukeunivdsp:oai:localhost:10161/29132).Poirot: private contact summary aggregation: poster abstract., , , , , , , , and . SenSys, page 774-775. ACM, (2020)IncShrink: Architecting Efficient Outsourced Databases using Incremental MPC and Differential Privacy., , , and . SIGMOD Conference, page 818-832. ACM, (2022)TAG: Gradient Attack on Transformer-based Language Models., , , , , , , and . EMNLP (Findings), page 3600-3610. Association for Computational Linguistics, (2021)Deterministic Learning and Pattern-Based NN Control., , and . ISIC, page 144-149. IEEE, (2007)LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference., , , , , , , , , and 1 other author(s). CoRR, (2023)SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol., , , , , , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 16 (1): 113-123 (2019)Against Membership Inference Attack: Pruning is All You Need., , , , , , , and . IJCAI, page 3141-3147. ijcai.org, (2021)Privacy-preserving biomedical data dissemination via a hybrid approach., , and . AMIA, AMIA, (2018)A local approach of adaptive affinity propagation clustering for large scale data., , , and . IJCNN, page 2998-3002. IEEE Computer Society, (2009)