Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast and Effective Memristor-Based Method for Finding Approximate Eigenvalues and Eigenvectors of Non-negative Matrices., , , , and . ISVLSI, page 563-568. IEEE Computer Society, (2018)A local approach of adaptive affinity propagation clustering for large scale data., , , and . IJCNN, page 2998-3002. IEEE Computer Society, (2009)Privacy-preserving biomedical data dissemination via a hybrid approach., , and . AMIA, AMIA, (2018)Against Membership Inference Attack: Pruning is All You Need., , , , , , , and . IJCAI, page 3141-3147. ijcai.org, (2021)LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference., , , , , , , , , and 1 other author(s). NeurIPS, (2023)Variance of the Gradient Also Matters: Privacy Leakage from Gradients., , , , , , , , , and 1 other author(s). IJCNN, page 1-8. IEEE, (2022)The k-peak Decomposition: Mapping the Global Structure of Graphs., , , , and . WWW, page 1441-1450. ACM, (2017)An Improved Delay-dependent Stability Criteria for Recurrent Neural Networks with Time-varying Delay., , and . ISIC, page 876-881. IEEE, (2008)China's 12-Year Quest of Autonomous Vehicular Intelligence: The Intelligent Vehicles Future Challenge Program., , , , , , , , , and 1 other author(s). IEEE Intell. Transp. Syst. Mag., 13 (2): 6-19 (2021)Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers., , , , and . SIGMOD Conference, page 603-619. ACM, (2020)