Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HE-PEx: Efficient Machine Learning under Homomorphic Encryption using Pruning, Permutation and Expansion., , , , , , , , , and 1 other author(s). CoRR, (2022)Anomaly Detection in Large Databases Using Behavioral Patterning., , , , , , , , and . ICDE, page 1140-1149. IEEE Computer Society, (2017)Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption., , , , , and . CCS, page 3567-3569. ACM, (2023)A Cloud-Based Anomaly Detection for IoT Big Data., , , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 87-104. Springer, (2020)Generating One-Hot Maps Under Encryption., , , , and . CSCML, volume 13914 of Lecture Notes in Computer Science, page 96-116. Springer, (2023)Hartigan's K-Means Versus Lloyd's K-Means - Is It Time for a Change?, , and . IJCAI, page 1677-1684. IJCAI/AAAI, (2013)Show Me Your Evidence - an Automatic Method for Context Dependent Evidence Detection., , , , , and . EMNLP, page 440-450. The Association for Computational Linguistics, (2015)Tile Tensors: A versatile data structure with descriptive shapes for homomorphic encryption., , , , , , , , and . CoRR, (2020)A Benchmark Dataset for Automatic Detection of Claims and Evidence in the Context of Controversial Topics., , , , , , , and . ArgMining@ACL, page 64-68. The Association for Computer Linguistics, (2014)Privacy-Preserving Record Linkage Using Local Sensitive Hash and Private Set Intersection., , , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 398-424. Springer, (2022)