Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shilling Attack Detection Using Rated Item Correlation for Collaborative Filtering., , and . SMC, page 3553-3558. IEEE, (2018)GAN-Based Domain Inference Attack., and . AAAI, page 14214-14222. AAAI Press, (2023)Image Disguising for Privacy-preserving Deep Learning., and . ACM Conference on Computer and Communications Security, page 2291-2293. ACM, (2018)Wound Tissue Segmentation in Diabetic Foot Ulcer Images Using Deep Learning: A Pilot Study., , , , , , , and . CoRR, (2024)Scalable Sequence Clustering for Large-Scale Immune Repertoire Analysis., , , , and . IEEE BigData, page 1349-1358. IEEE, (2021)Privacy-Preserving Boosting with Random Linear Classifiers., and . ACM Conference on Computer and Communications Security, page 2294-2296. ACM, (2018)Shilling attack based on item popularity and rated item correlation against collaborative filtering., , , and . Int. J. Machine Learning & Cybernetics, 10 (7): 1833-1845 (2019)Knowledge Graph Enhanced Community Detection and Characterization., , , , , , and . WSDM, page 51-59. ACM, (2019)Multi-region Coverage Path Planning for Heterogeneous Unmanned Aerial Vehicles Systems., , , and . SOSE, IEEE, (2019)Making Your Program Oblivious: A Comparative Study for Side-channel-Safe Confidential Computing., and . CLOUD, page 282-289. IEEE, (2023)