Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD., , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 6392-6400. PMLR, (2019)Quantifying and Mitigating Privacy Risks for Tabular Generative Models., , , , , and . CoRR, (2024)Towards Remote Verifiable Computation without Digital Secrets.. ASHES@CCS, page 1. ACM, (2022)Leveraging Hardware Isolation for Process Level Access Control & Authentication., , , , and . SACMAT, page 133-141. ACM, (2017)Analysis of the Sensitivity Attack against Electronic Watermarks in Images., and . Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 258-272. Springer, (1998)Mitigating Synchronized Hardware Trojan Attacks in Smart Grids., , , , and . SPSR-SG@CPSWeek, page 35-40. ACM, (2017)A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon Decoding., , , and . AAECC, volume 2227 of Lecture Notes in Computer Science, page 343-352. Springer, (2001)A Linear Construction of Perfect Secret Sharing Schemes.. EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 23-34. Springer, (1994)Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM., , , , , and . TCC (A2), volume 9563 of Lecture Notes in Computer Science, page 145-174. Springer, (2016)Watermark Estimation through Detector Analysis., , and . ICIP (1), page 425-429. IEEE Computer Society, (1998)