Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-Supervised Learning Based on Generative Adversarial Network and Its Applied to Lithology Recognition., , , , and . IEEE Access, (2019)Efficiently Supporting Structure Queries on Phylogenetic Trees., , and . SSDBM, page 93-102. (2005)Crimson: A Data Management System to Support Evaluating Phylogenetic Tree Reconstruction Algorithms., , , , , and . VLDB, page 1231-1234. ACM, (2006)RRXF: Redundancy reducing XML storage in relations., , , and . VLDB, page 189-200. Morgan Kaufmann, (2003)Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks., , , , , , and . CoRR, (2020)Optimizing Secure Decision Tree Inference Outsourcing., , , , and . CoRR, (2021)Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization., , , , , and . CoRR, (2022)SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases., , , , , and . CoRR, (2022)Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition., , , and . CoRR, (2022)Distributed algorithm for AP association with random arrivals and departures of users., , , , and . IET Commun., 14 (5): 846-856 (2020)