Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spy vs. Spy: Rumor Source Obfuscation., , and . CoRR, (2014)Extremal Mechanisms for Local Differential Privacy., , and . J. Mach. Learn. Res., (2016)Federated Heavy Hitters Discovery with Differential Privacy., , , , and . CoRR, (2019)Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs., , , , and . IEEE J. Sel. Areas Inf. Theory, 2 (1): 464-478 (2021)Series Editorial: The Second Issue of the Series on Machine Learning in Communications and Networks., , , , , , , , and . IEEE J. Sel. Areas Commun., 39 (7): 1855-1857 (2021)Series Editorial: Inauguration Issue of the Series on Machine Learning in Communications and Networks., , , , , , , , and . IEEE J. Sel. Areas Commun., 39 (1): 1-3 (2021)The Fifth Issue of the Series on Machine Learning in Communications and Networks., , , , , , , , and . IEEE J. Sel. Areas Commun., 40 (8): 2251-2253 (2022)Private Federated Learning in Gboard., , , , , and . CoRR, (2023)Privacy-Utility Trades in Crowdsourced Signal Map Obfuscation., , , , and . CoRR, (2022)Theoretical Guarantees for Model Auditing with Finite Adversaries., , , and . CoRR, (2019)