Author of the publication

Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation.

, , , and . IWSPA@CODASPY, page 61-69. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CECILIA: Comprehensive Secure Machine Learning Framework., , and . CoRR, (2022)Alternative PPM Model for Quality Score Compression., and . BIOINFORMATICS, page 122-126. SciTePress, (2013)VCF-Explorer: filtering and analysing whole genome VCF files., and . Bioinform., 33 (21): 3468-3470 (2017)Attacks and improvements to chaotic map-based RFID authentication protocol., , and . Secur. Commun. Networks, 8 (18): 4028-4040 (2015)New Results on the Key Scheduling Algorithm of RC4., , and . INDOCRYPT, volume 5365 of Lecture Notes in Computer Science, page 40-52. Springer, (2008)A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment., , and . IEEE Access, (2023)ppAUC: Privacy Preserving Area Under the Curve with Secure 3-Party Computation., , and . CoRR, (2021)ESCAPED: Efficient Secure and Private Dot Product Framework for Kernel-based Machine Learning Algorithms with Applications in Healthcare., , and . CoRR, (2020)ESCAPED: Efficient Secure and Private Dot Product Framework for Kernel-based Machine Learning Algorithms with Applications in Healthcare., , and . AAAI, page 9988-9996. AAAI Press, (2021)Vulnerabilities of RFID Security Protocol Based on Chaotic Maps., , and . ICNP, page 648-653. IEEE Computer Society, (2014)