Author of the publication

Experience Mining: Building a Large-Scale Database of Personal Experiences and Opinions from Web Documents.

, , , , , , , , and . Web Intelligence, page 314-321. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 21-32 (2020)Single-Shuffle Card-Based Protocol with Eight Cards per Gate., , and . UCNC, volume 14003 of Lecture Notes in Computer Science, page 171-185. Springer, (2023)Tree-based Secure Comparison of Secret Shared Data., , , , , and . ISITA, page 525-529. IEEE, (2018)On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (1): 73-90 (2017)Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)Constant-Round Private Decision Tree Evaluation for Secret Shared Data., , , , and . IACR Cryptol. ePrint Arch., (2023)Oblivious Linear Group Actions and Applications., , , , , , , and . CCS, page 630-650. ACM, (2021)Cryptanalysis of EAXprime., , and . IACR Cryptology ePrint Archive, (2012)On the Security of Non-Interactive Key Exchange against Related-Key Attacks., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (9): 1910-1923 (2017)Secure Parallel Computation on Privately Partitioned Data and Applications., , , , , and . CCS, page 151-164. ACM, (2022)