Author of the publication

Privacy-preserving indoor localization via light transport analysis.

, , and . ICASSP, page 3331-3335. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography., , , , , , and . Information Hiding, volume 3727 of Lecture Notes in Computer Science, page 327-341. Springer, (2005)Necessary and Sufficient Conditions and a Provably Efficient Algorithm for Separable Topic Discovery., , and . CoRR, (2015)Sensing-Aware Kernel SVM., , , and . CoRR, (2013)A Topic Modeling Approach to Ranking., , and . CoRR, (2014)Towards a theory for video coding using distributed compression principles., , and . ICIP (2), page 687-690. IEEE, (2003)Efficient Distributed Topic Modeling with Provable Guarantees., , , and . AISTATS, volume 33 of JMLR Workshop and Conference Proceedings, page 167-175. JMLR.org, (2014)Bootstrapped oblivious transfer and secure two-party function computation., and . ISIT, page 1303-1307. IEEE, (2009)Information-Theoretically Secure Three-Party Computation with One Active Adversary, , and . CoRR, (2012)On unconditionally secure multiparty computation for realizing correlated equilibria in games., , and . GlobalSIP, page 241-244. IEEE, (2013)On compressing encrypted data., , , , and . IEEE Trans. Signal Process., 52 (10): 2992-3006 (2004)