From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority., , , , и . ACM Conference on Computer and Communications Security, стр. 805-817. ACM, (2016)Secure Graph Analysis at Scale., , , , , и . CCS, стр. 610-629. ACM, (2021)New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems., , , , , и . BIOSIG, том P-212 из LNI, стр. 171-184. GI, (2013)On Brightness Agnostic Adversarial Examples Against Face Recognition Systems., , , и . BIOSIG, том P-315 из LNI, стр. 197-204. Gesellschaft für Informatik e.V., (2021)Generalizing the SPDZ Compiler For Other Protocols., , , , , , и . ACM Conference on Computer and Communications Security, стр. 880-895. ACM, (2018)How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ., , , , , и . ACM Conference on Computer and Communications Security, стр. 2198-2200. ACM, (2018)Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption.. ICITS, том 5155 из Lecture Notes in Computer Science, стр. 2-13. Springer, (2008)Advancing Deep Metric Learning With Adversarial Robustness., , и . ACML, том 222 из Proceedings of Machine Learning Research, стр. 1231-1246. PMLR, (2023)Adversarial Robustness for Face Recognition: How to Introduce Ensemble Diversity among Feature Extractors?, , , , , и . SafeAI@AAAI, том 2808 из CEUR Workshop Proceedings, CEUR-WS.org, (2021)TinyPEDS: Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks, , , и . Elsevier Ad-hoc Networks Journal, 7 (7): 1073--1089 (2006)