Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Generalized Suffix Tree Construction for Genomic Data., , and . AlCoB, volume 12099 of Lecture Notes in Computer Science, page 3-15. Springer, (2020)Due to COVID-19 postponed to AlCoB 2021..SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption., , , , , and . CoRR, (2017)The Risk-Utility Tradeoff for Data Privacy Models., , , and . NTMS, page 1-5. IEEE, (2016)Malware Classification with Deep Convolutional Neural Networks., , , , , and . NTMS, page 1-5. IEEE, (2018)Secure Distributed Framework for Achieving ε-Differential Privacy., , , and . Privacy Enhancing Technologies, volume 7384 of Lecture Notes in Computer Science, page 120-139. Springer, (2012)Image-Centric Social Discovery Using Neural Network under Anonymity Constraint., , and . IC2E, page 238-244. IEEE Computer Society, (2017)FedShare: Secure Aggregation based on Additive Secret Sharing in Federated Learning., , , and . IDEAS, page 25-33. ACM, (2023)Comparative Analysis of Membership Inference Attacks in Federated Learning., , , and . IDEAS, page 185-192. ACM, (2023)PAARS: Privacy Aware Access Regulation System., and . UEMCON, page 155-161. IEEE, (2020)CPU and GPU Accelerated Fully Homomorphic Encryption., , and . HOST, page 142-153. IEEE, (2020)