Author of the publication

Detecting Misogynous Tweets.

, , , , and . IberEval@SEPLN, volume 2150 of CEUR Workshop Proceedings, page 242-248. CEUR-WS.org, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems., , , and . IACR Cryptology ePrint Archive, (2009)Universally Composable Oblivious Transfer Based on a Variant of LPN., , and . CANS, volume 8813 of Lecture Notes in Computer Science, page 143-158. Springer, (2014)Round-Optimal Deniable Ring Authentication in the Presence of Big Brother., , , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 307-321. Springer, (2010)Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation., , , , and . IACR Cryptol. ePrint Arch., (2021)Performability Assessment of a Government Process in the Cloud., , , , , and . SMC, page 87-92. IEEE, (2015)Detecting Misogynous Tweets., , , , and . IberEval@SEPLN, volume 2150 of CEUR Workshop Proceedings, page 242-248. CEUR-WS.org, (2018)Privacy-Preserving Linear Regression for Brain-Computer Interface Applications., , , , , , and . IEEE BigData, page 5277-5278. IEEE, (2018)Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare., , , , , , and . IEEE BigData, page 2413-2422. IEEE, (2018)A Decentralized Information Marketplace Preserving Input and Output Privacy., , , , , , and . DEC@SIGMOD, page 1-6. ACM, (2023)Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation., , , , and . NeurIPS, page 3752-3764. (2019)