Author of the publication

Randomization is all you need: A privacy-preserving federated learning framework for news recommendation.

, , , , and . Inf. Sci., (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (10): 1891-1894 (2016)Design and Practice of Virtual Experiments for Internet of Things Class., , , , and . ICCSE (2), volume 1812 of Communications in Computer and Information Science, page 441-449. Springer, (2022)Privacy-Preserving Reputation Management for Blockchain-Based Mobile Crowdsensing., , , and . SECON, page 1-9. IEEE, (2020)Enabling Assured Deletion in the Cloud Storage by Overwriting., , , and . SCC@AsiaCCS, page 17-23. ACM, (2016)Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation., , , , and . TrustCom/BigDataSE/ISPA (1), page 434-442. IEEE, (2015)SecGAN: Honest-Majority Maliciously 3PC Framework for Privacy-Preserving Image Synthesis., , , , and . TrustCom, page 1119-1126. IEEE, (2023)BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof., , , and . ICA3PP (3), volume 12454 of Lecture Notes in Computer Science, page 520-536. Springer, (2020)Smart Contract Scams Detection with Topological Data Analysis on Account Interaction., , , , , and . CIKM, page 468-477. ACM, (2022)A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance., , , , and . MSN, page 1-8. IEEE, (2021)Privacy Preserving Outsourced K-means Clustering Using Kd-tree., , , , , and . ProvSec, volume 14217 of Lecture Notes in Computer Science, page 345-364. Springer, (2023)