Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks.. CoRR, (2020)Construction of Differentially Private Summaries Over Fully Homomorphic Encryption., , , and . DEXA (2), volume 12924 of Lecture Notes in Computer Science, page 9-21. Springer, (2021)Top-down itemset recoding for releasing private complex data., , , , , and . PST, page 373-376. IEEE Computer Society, (2013)TURank: Twitter User Ranking Based on User-Tweet Graph Analysis., , , and . WISE, volume 6488 of Lecture Notes in Computer Science, page 240-253. Springer, (2010)Watermark-embedded Adversarial Examples for Copyright Protection against Diffusion Models., , and . CoRR, (2024)Homomorphic Encryption-Friendly Privacy-Preserving Partitioning Algorithm for Differential Privacy., , , and . IEEE Big Data, page 5812-5822. IEEE, (2022)Federated Graph Analytics with Differential Privacy., , , , , , , and . CoRR, (2024)A Ranking Method for Web Search Using Social Bookmarks., and . DASFAA, volume 5463 of Lecture Notes in Computer Science, page 585-589. Springer, (2009)Frequency-aware GAN for Adversarial Manipulation Generation., , , and . ICCV, page 4292-4301. IEEE, (2023)PEARL: Data Synthesis via Private Embeddings and Adversarial Reconstruction Learning., , and . CoRR, (2021)