Author of the publication

Matrix Eigen-decomposition via Doubly Stochastic Riemannian Optimization.

, , , and . ICML, volume 48 of JMLR Workshop and Conference Proceedings, page 1660-1669. JMLR.org, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework to enforce access control over data streams., , , and . ACM Trans. Inf. Syst. Secur., 13 (3): 28:1-28:31 (2010)One-off Disclosure Control by Heterogeneous Generalization., , , , and . USENIX Security Symposium, page 3363-3377. USENIX Association, (2022)Active learning for accurate analysis of streaming partial discharge data., , , , , and . ICPHM, page 1-5. IEEE, (2015)DAG: A General Model for Privacy-Preserving Data Mining : (Extended Abstract)., , and . ICDE, page 2018-2019. IEEE, (2020)Privacy-preserving survey by crowdsourcing with smartphones., , and . WF-IoT, page 647-651. IEEE, (2018)ASSIST: access controlled ship identification streams., , , , , and . GIS, page 485-488. ACM, (2011)DBMask: Fine-Grained Access Control on Encrypted Relational Databases., , , and . CODASPY, page 1-11. ACM, (2015)Active Learning for On-Line Partial Discharge Monitoring in Noisy Environments., , , , and . MDM (Workshops), page 37-42. IEEE Computer Society, (2016)CASTLE: A delay-constrained scheme for ks-anonymizing data streams., , , and . ICDE, page 1376-1378. IEEE Computer Society, (2008)Adaptive Grid-Based k-median Clustering of Streaming Data with Accuracy Guarantee., , and . DASFAA (1), volume 9049 of Lecture Notes in Computer Science, page 75-91. Springer, (2015)