From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a scalable, private, and searchable key-value store., , , , и . CNS, стр. 773-774. IEEE, (2015)Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing., , , , и . IEEE Trans. Multim., 18 (10): 2002-2014 (2016)Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy., , , , , , , и . NDSS, The Internet Society, (2021)Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation., , , и . AsiaCCS, стр. 337-350. ACM, (2022)Rethinking Practical Blockchain-Based Symmetric Searchable Encryption Services., , , , и . TrustCom, стр. 307-317. IEEE, (2023)Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves., , , , и . ACNS (1), том 12726 из Lecture Notes in Computer Science, стр. 50-75. Springer, (2021)Towards Private Multi-operator Network Slicing., , , , и . ACISP (3), том 14897 из Lecture Notes in Computer Science, стр. 359-379. Springer, (2024)Trustworthy Graph Neural Networks: Aspects, Methods and Trends., , , , , и . CoRR, (2022)Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts., , , , и . CoRR, (2024)Exploiting and Securing ML Solutions in Near-RT RIC: A Perspective of an xApp., , , , , , , и . CoRR, (2024)