From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations., , , , , , , , и . IEEE Access, (2016)Lightweight Mutual Authentication for IoT and Its Applications., , и . IEEE Trans. Sustain. Comput., 2 (4): 359-370 (2017)Local Differential Privacy for Deep Learning., , , , и . CoRR, (2019)A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS., , , , , и . CoRR, (2018)Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures., , , , и . ACNS, том 11464 из Lecture Notes in Computer Science, стр. 67-88. Springer, (2019)A Method to Obtain Signatures from Honeypots Data., , и . NPC, том 3222 из Lecture Notes in Computer Science, стр. 435-442. Springer, (2004)Design and Evaluation of an Integrated Collaboration Platform for Secure Information Sharing., , , , и . CDVE, том 9929 из Lecture Notes in Computer Science, стр. 185-193. (2016)Privacy Preserving Location-Aware Personalized Web Service Recommendations., , , , , , и . IEEE Trans. Serv. Comput., 14 (3): 791-804 (2021)A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems., , , , , и . IEEE Trans. Ind. Informatics, 16 (9): 6092-6102 (2020)Privacy Preserving Face Recognition Utilizing Differential Privacy., , , , и . Comput. Secur., (2020)