Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analog circuit synthesis using two-port theory and genetic programming., , and . AFRICON, page 1-8. IEEE, (2011)Obfuscated Access and Search Patterns in Searchable Encryption., , , and . NDSS, The Internet Society, (2021)DEEPCASE: Semi-Supervised Contextual Analysis of Security Events., , , , , , , , , and . SP, page 522-539. IEEE, (2022)Multiplication-Free Biometric Recognition for Faster Processing under Encryption., , , and . IJCB, page 1-9. IEEE, (2022)Anonymized Counting of Nonstationary Wi-Fi Devices When Monitoring Crowds., , , and . MSWiM, page 213-222. ACM, (2022)Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks., , , , , , and . AISec@CCS, page 13-24. ACM, (2022)REPLICAWATCHER: Training-less Anomaly Detection in Containerized Microservices., , , and . NDSS, The Internet Society, (2024)Privacy-Preserving Verification of Clinical Research., , , , , , and . Sicherheit, volume P-228 of LNI, page 481-500. GI, (2013)Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison., , , , , and . IJCB, page 1-10. IEEE, (2023)HeadPrint: detecting anomalous communications through header-based application fingerprinting., , , , , , , , and . SAC, page 1696-1705. ACM, (2020)