Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks.. CoRR, (2020)Measuring Lower Bounds of Local Differential Privacy via Adversary Instantiations in Federated Learning., , , and . CoRR, (2022)Construction of Differentially Private Summaries Over Fully Homomorphic Encryption., , , and . DEXA (2), volume 12924 of Lecture Notes in Computer Science, page 9-21. Springer, (2021)Top-down itemset recoding for releasing private complex data., , , , , and . PST, page 373-376. IEEE Computer Society, (2013)Homomorphic Encryption-Friendly Privacy-Preserving Partitioning Algorithm for Differential Privacy., , , and . IEEE Big Data, page 5812-5822. IEEE, (2022)TURank: Twitter User Ranking Based on User-Tweet Graph Analysis., , , and . WISE, volume 6488 of Lecture Notes in Computer Science, page 240-253. Springer, (2010)PEARL: Data Synthesis via Private Embeddings and Adversarial Reconstruction Learning., , and . CoRR, (2021)Frequency-aware GAN for Adversarial Manipulation Generation., , , and . ICCV, page 4292-4301. IEEE, (2023)A Ranking Method for Web Search Using Social Bookmarks., and . DASFAA, volume 5463 of Lecture Notes in Computer Science, page 585-589. Springer, (2009)GlassMasq: Adversarial Examples Masquerading in Face Identification Systems with Feature Extractor., , and . PST, page 1-7. IEEE, (2019)