Author of the publication

A Kernel-Based Method for Resolving Performance Inefficiencies in Mining Frequent-Patterns in Encrypted Data.

, , , and . CANDAR Workshops, page 506-510. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust In Unmanned Driving System., , and . HRI (Extended Abstracts), page 7-8. ACM, (2015)Vehicle Politeness in Driving Situations., , and . Future Internet, 11 (2): 48 (2019)An experimental analysis of limitations of MapReduce for iterative algorithms on Spark., and . Clust. Comput., 20 (4): 3593-3604 (2017)MoveMine: Mining moving object data for discovery of animal movement patterns., , , , , , , and . ACM Trans. Intell. Syst. Technol., 2 (4): 37:1-37:32 (2011)Quality-Based Automatic Classification for Presentation Slides., , , , and . ECIR, volume 8416 of Lecture Notes in Computer Science, page 638-643. Springer, (2014)Temporal Convolutional Network-Based Time-Series Segmentation., and . BigComp, page 269-276. IEEE, (2023)On Finding Fine-Granularity User Communities by Profile Decomposition., , , and . ASONAM, page 631-639. IEEE Computer Society, (2012)MoveMine: mining moving object databases., , , , , , and . SIGMOD Conference, page 1203-1206. ACM, (2010)Multiple Dynamic Outlier-Detection from a Data Stream by Exploiting Duality of Data and Queries., , , and . SIGMOD Conference, page 2063-2075. ACM, (2021)SocialKeyboard: Proofreading Everyday Writings in Mobile Phones., , , and . CHI Extended Abstracts, page 1591-1596. ACM, (2015)