Author of the publication

Secure Transfer Learning for Machine Fault Diagnosis Under Different Operating Conditions.

, , and . ProvSec, volume 12505 of Lecture Notes in Computer Science, page 278-297. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IACR Cryptology ePrint Archive, (2018)Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs., , , , , , , , and . IEEE Trans. Emerg. Top. Comput., 9 (3): 1330-1343 (2021)Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IEEE Trans. Emerg. Top. Comput., 9 (2): 941-956 (2021)The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs., , , , , , , , and . CoRR, (2018)Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography., , and . SOLI, page 26-31. IEEE, (2018)Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments., , , , and . Critical Infrastructure Protection, volume 686 of IFIP Advances in Information and Communication Technology, page 177-192. Springer, (2023)A Framework of Software Rejuvenation for Survivability., and . AINA (2), page 507-510. IEEE Computer Society, (2004)Flexible Yet Secure De-duplication Service for Enterprise Data on Cloud Storage., , , and . ICCCRI, page 37-44. IEEE Computer Society, (2015)Incorporating Energy and Throughput Awareness in Design Space Exploration and Run-Time Mapping for Heterogeneous MPSoCs., , , and . DSD, page 513-521. IEEE Computer Society, (2013)Exploiting loop-array dependencies to accelerate the design space exploration with high level synthesis., , , and . DATE, page 157-162. ACM, (2015)