From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protecting against physical resource monitoring., , и . WPES, стр. 23-32. ACM, (2011)Compression Boosts Differentially Private Federated Learning., , , и . CoRR, (2020)Constrained differentially private federated learning for low-bandwidth devices., , , и . UAI, том 161 из Proceedings of Machine Learning Research, стр. 1756-1765. AUAI Press, (2021)Client-specific Property Inference against Secure Aggregation in Federated Learning., , и . WPES@CCS, стр. 45-60. ACM, (2023)Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 72-79. IEEE, (2019)The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks., , и . MASS, стр. 1-6. IEEE Computer Society, (2007)Measuring Contributions in Privacy-Preserving Federated Learning., , и . ERCIM News, (2021)Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks., , и . ESAS, том 3813 из Lecture Notes in Computer Science, стр. 113-127. Springer, (2005)You are what you like! Information leakage through users' Interests., , и . NDSS, The Internet Society, (2012)Biztonságos útvonalválasztás többugrásos vezetéknélküli hálózatokban.. Budapest University of Technology and Economics, Hungary, (2009)