Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiently Stealing your Machine Learning Models., , and . WPES@CCS, page 198-210. ACM, (2019)Designing complex intelligent systems on the basis of ontological models., , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 266-277. CEUR-WS.org, (2020)Cryptographic Semantic System for Provision of the Performance Mode of Perfect Strong., , , , , and . CybHyg, volume 2654 of CEUR Workshop Proceedings, page 458-470. CEUR-WS.org, (2019)Application of the Polynomial Maximization Method for Estimation Parameters in the Polynomial Regression with Non-Gaussian Residuals., , and . AUTOMATION, volume 1390 of Advances in Intelligent Systems and Computing, page 402-415. Springer, (2021)Application of the Polynomial Maximization Method for Estimation Parameters of Autoregressive Models with Asymmetric Innovations., , and . AUTOMATION, volume 1427 of Advances in Intelligent Systems and Computing, page 380-390. Springer, (2022)Ontological Modeling of Intelligent Learning Systems with Elements of Gamification., , , and . CPITS, volume 3421 of CEUR Workshop Proceedings, page 25-35. CEUR-WS.org, (2023)Privacy-Preserving Genomics on a Large Scale.. Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2018)Faster Privacy-Preserving Location Proximity Schemes., , , , and . CANS, volume 11124 of Lecture Notes in Computer Science, page 3-22. Springer, (2018)Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies., , , and . AsiaCCS, page 221-235. ACM, (2018)Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting., , , , , , and . ICL-GNSS, page 1-6. IEEE, (2018)