From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure and Efficient Multiparty Computation on Genomic Data., , , и . IDEAS, стр. 278-283. ACM, (2016)Privacy-Preserving Learning via Data and Knowledge Distillation., , , и . DSAA, стр. 1-10. IEEE, (2023)Privacy preserving neural networks for electronic health records de-identification., , , и . BCB, стр. 8:1-8:6. ACM, (2021)A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks., , , , и . WiMob, стр. 417-422. IEEE Computer Society, (2008)Efficient Privacy-Preserving Approaches for Trajectory Datasets., , , , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 612-619. IEEE, (2020)A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs., , , , и . WiMob, стр. 608-612. IEEE Computer Society, (2008)A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET., , , , и . WCNC, стр. 2816-2821. IEEE, (2008)Nearest neighbour search over encrypted data using intel SGX., , , , и . J. Inf. Secur. Appl., (2020)Differentially private data release for data mining., , , и . KDD, стр. 493-501. ACM, (2011)Secure and Private Management of Healthcare Databases for Data Mining., , , и . CBMS, стр. 191-196. IEEE Computer Society, (2015)