Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low Level Descriptors for Automatic Violin Transcription., , and . ISMIR, page 164-167. (2006)Underwater Frogman Situational Awareness and AR Helmet Display and Control System., , and . VINCI, page 10:1-10:7. ACM, (2019)Supplier's Information Strategy in the Presence of a Dominant Retailer., , and . UKCI, volume 650 of Advances in Intelligent Systems and Computing, page 349-354. Springer, (2017)A back propagation artificial neural network application in lithofacies identification., , , , , , and . ICNC, page 1028-1033. IEEE, (2015)On methods for privacy-preserving energy disaggregation., , , , , , and . ICASSP, page 6404-6408. IEEE, (2017)On Non-Parametric Field Estimation using Randomly Deployed, Noisy, Binary Sensors., and . ISIT, page 686-690. IEEE, (2007)Information-theoretically secure three-party computation with One corrupted party., , and . ISIT, page 3160-3164. IEEE, (2013)Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms., , and . CoRR, (2017)Robust fault detection and isolation based on zonotopic unknown input observers for discrete-time descriptor systems., , , and . J. Frankl. Inst., 356 (10): 5293-5314 (2019)A Survey of Exploitation Techniques and Defenses for Program Data Attacks., , , , and . J. Netw. Comput. Appl., (2020)