Author of the publication

Oblivious Neural Network Computing via Homomorphic Encryption.

, , and . EURASIP J. Information Security, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FISH: Face intensity-shape histogram representation for automatic face splicing detection., , , , and . J. Vis. Commun. Image Represent., (2019)Experiencing with electronic image stabilization and PRNU through scene content image registration., , , and . Pattern Recognit. Lett., (2021)Multi-Clue Reconstruction of Sharing Chains for Social Media Images., , , , , , and . IEEE Trans. Multim., (2023)Multi-clue reconstruction of sharing chains for social media images., , , , , , and . CoRR, (2021)An efficient buyer-seller watermarking protocol based on composite signal representation., , , and . MM&Sec, page 9-18. ACM, (2009)Near optimal detection of quantized signals and application to JPEG forensics., , and . WIFS, page 168-173. IEEE, (2013)Watermark-based secure communications in safety-related scenarios., , , , and . ISMICT, page 1-5. IEEE, (2016)Physical layer security based on spread-spectrum watermarking and jamming receiver., , , , and . Trans. Emerg. Telecommun. Technol., (2017)Image processing for the analysis and conservation of paintings: opportunities and challenges., , and . IEEE Signal Process. Mag., 22 (5): 141-144 (2005)PRNU-Based Video Source Attribution: Which Frames Are You Using?, , and . J. Imaging, 8 (3): 57 (2022)