Author of the publication

Privacy-preserving outsourcing support vector machines with random transformation.

, and . KDD, page 363-372. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DPSP: Distributed Progressive Sequential Pattern Mining on the Cloud., , and . PAKDD (2), volume 6119 of Lecture Notes in Computer Science, page 27-34. Springer, (2010)Exploring Dual-Triangular Structure for Efficient R-Initiated Tall-Skinny QR on GPGPU., and . PAKDD (2), volume 11440 of Lecture Notes in Computer Science, page 578-589. Springer, (2019)Language-model-based detection cascade for efficient classification of image-based spam e-mail., and . ICME, page 1182-1185. IEEE, (2009)Robust Block-Based EZW Image Compression with Channel Noise Optimized Rate-Distortion Functions., , , and . ICIP (2), page 560-564. IEEE, (1999)Adaptive balanced hybrid data delivery for multi-channel data broadcast., and . ICC, page 960-964. IEEE, (2002)Efficient Data Broadcasting by Progressively Merging and Splitting., and . GLOBECOM, IEEE, (2006)Using Mobile Phones to Monitor Shopping Time at Physical Stores., , , , and . IEEE Pervasive Comput., 10 (2): 37-43 (2011)Performance Analysis of Dynamic Finite Versioning Schemes: Storage Cost vs. Obsolescence., , , and . IEEE Trans. Knowl. Data Eng., 8 (6): 985-1001 (1996)A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee., , , and . IEEE Trans. Knowl. Data Eng., 28 (1): 2-16 (2016)Query-oriented Graph Clustering., , and . PAKDD (2), volume 10235 of Lecture Notes in Computer Science, page 749-761. (2017)