Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy preserving probabilistic inference with Hidden Markov Models., , , and . ICASSP, page 5868-5871. IEEE, (2011)Semantic Extensions of the Ephyra QA System for TREC 2007., , , , , and . TREC, volume 500-274 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2007)Large Margin Gaussian Mixture Models with Differential Privacy., and . IEEE Trans. Dependable Secur. Comput., 9 (4): 463-469 (2012)A Practical System for Privacy-Preserving Collaborative Filtering., , and . ICDM Workshops, page 547-554. IEEE Computer Society, (2012)Privacy Preserving Speaker Verification Using Adapted GMMs., and . INTERSPEECH, page 2405-2408. ISCA, (2011)Multiparty Differential Privacy via Aggregation of Locally Trained Classifiers., , and . NIPS, page 1876-1884. Curran Associates, Inc., (2010)Learning Algorithms for Domain Adaptation., and . ACML, volume 5828 of Lecture Notes in Computer Science, page 293-307. Springer, (2009)Privacy-Preserving Speaker Authentication., , , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 1-22. Springer, (2012)Privacy-Preserving Speech Processing: Cryptographic and String-Matching Frameworks Show Promise., , , and . IEEE Signal Process. Mag., 30 (2): 62-74 (2013)Efficient Protocols for Principal Eigenvector Computation over Private Data., and . Trans. Data Priv., 4 (3): 129-146 (2011)