Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-Device Smishing Classifier Resistant to Text Evasion Attack., , , , , , and . IEEE Access, (2024)Can LLMs Keep a Secret? Testing Privacy Implications of Language Models via Contextual Integrity Theory., , , , , , and . CoRR, (2023)Memory data reorganization for performance improvement of HEVC DCT., , , and . ICEIC, page 1-2. IEEE, (2014)Perspective-taking and Pragmatics for Generating Empathetic Responses Focused on Emotion Causes., , and . EMNLP (1), page 2227-2240. Association for Computational Linguistics, (2021)Computational Approach to Structural Analysis of Protein-RNA Complexes., , and . International Conference on Computational Science, volume 2659 of Lecture Notes in Computer Science, page 140-150. Springer, (2003)Soccer Video Mosaicing Using Self-Calibration and Line Tracking., and . ICPR, page 1592-1595. IEEE Computer Society, (2000)Automatic Cloud Bursting under FermiCloud., , , , , , , , and . ICPADS, page 681-686. IEEE Computer Society, (2013)Supervised Hashing via Uncorrelated Component Analysis., , and . AAAI, page 236-242. AAAI Press, (2016)Poster: Towards Acoustic-Based Tagless Object Tracking with Smartwatches., , and . MobiSys, page 664-665. ACM, (2024)HPC resources for CMS offline computing: An integration and scalability challenge for the Submission Infrastructure., , , , , , , and . CoRR, (2024)