Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LucidiTEE: Scalable Policy-Based Multiparty Computation with Fairness., , , and . CANS, volume 14342 of Lecture Notes in Computer Science, page 343-367. Springer, (2023)Cryptography with Weights: MPC, Encryption and Signatures., , , , , and . CRYPTO (1), volume 14081 of Lecture Notes in Computer Science, page 295-327. Springer, (2023)Amortized Threshold Symmetric-key Encryption., , , and . CCS, page 2758-2779. ACM, (2021)Verification of Quantitative Hyperproperties Using Trace Enumeration Relations., , and . CAV (1), volume 12224 of Lecture Notes in Computer Science, page 201-224. Springer, (2020)Low-complexity speaker verification with decimated supervector representations., and . Speech Commun., (2015)Improving Speech Transcription for Mandarin-English Translation., , , , , , , and . ICASSP (4), page 97-100. IEEE, (2007)Exploring Sparse Representation for Improved Online Handwriting Recognition., , , , and . ICFHR, page 410-415. IEEE Computer Society, (2018)IITG- Indigo Submissions for NIST 2018 Speaker Recognition Evaluation and Post-Challenge Improvements., , , , and . NCC, page 1-5. IEEE, (2020)Anomaly Detection Using System Logs: A Deep Learning Approach., , , and . Int. J. Inf. Secur. Priv., 16 (1): 1-15 (2022)AGROASSAM: A Web Based Assamese Speech Recognition Application for Retrieving Agricultural Commodity Price and Weather Information., , , , , , , , and . INTERSPEECH, page 3214-3215. ISCA, (2018)