Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract., , , , , and . AsiaCCS, page 617-628. ACM, (2016)Efficient Transfer Learning Schemes for Personalized Language Modeling using Recurrent Neural Network., , , , and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution., , , and . WISA, volume 4298 of Lecture Notes in Computer Science, page 45-59. Springer, (2006)LT-OLSR: Attack-tolerant OLSR against link spoofing., , , and . LCN, page 216-219. IEEE Computer Society, (2012)AdaFF: Adaptive Failure-Handling Framework for Composite Web Services., , , and . IEICE Trans. Inf. Syst., 93-D (4): 834-842 (2010)binOb+: a framework for potent and stealthy binary obfuscation., , and . AsiaCCS, page 271-281. ACM, (2010)Exclusion of Forged Files from Multi-source Downloadable P2P Systems., , , and . AINA, page 608-615. IEEE Computer Society, (2009)Graph Processing Scheme Using GPU With Value-Driven Differential Scheduling., , , , , , and . IEEE Access, (2024)Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices., , , , , and . USENIX Annual Technical Conference, page 565-578. USENIX Association, (2016)Allowing user-specified failure handling in web services composition., and . ICUIMC, page 452-458. ACM, (2008)