Author of the publication

PAC Learning Depth-3 $AC^0$ Circuits of Bounded Top Fanin.

, , and . ALT, volume 76 of Proceedings of Machine Learning Research, page 667-680. PMLR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JPEG Steganalysis Based on Multi-Projection Ensemble Discriminant Clustering., , and . IEICE Trans. Inf. Syst., 102-D (1): 198-201 (2019)Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles., and . Int. J. Digit. Crime Forensics, 6 (2): 40-51 (2014)An Efficient Batch Verifying Scheme for Detecting Illegal Signatures., , , and . Int. J. Netw. Secur., 17 (4): 463-470 (2015)Iris Segmentation Using Feature Channel Optimization for Noisy Environments., , , and . Cogn. Comput., 12 (6): 1205-1216 (2020)Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (3): 608-611 (2018)An Improved NSGA-III Algorithm Based on Deep Q-Networks for Cloud Storage Optimization of Blockchain., , , and . IEEE Trans. Parallel Distributed Syst., 34 (5): 1406-1419 (May 2023)Key Based Artificial Fingerprint Generation for Privacy Protection., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (4): 828-840 (2020)Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations., , , and . Secur. Commun. Networks, (2021)Efficient outsourced extraction of histogram features over encrypted images in cloud., , , and . Sci. China Inf. Sci., (2021)Practical parallel key-insulated encryption with multiple helper keys., , and . Comput. Math. Appl., 65 (9): 1403-1412 (2013)