Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward integrating overlay and physical networks for robust parallel processing architecture., , , , , and . IEEE Netw., 28 (4): 40-45 (2014)Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (12): 1849-1855 (2019)A Privacy-Preserving Machine Learning Scheme Using EtC Images., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (12): 1571-1578 (2020)Network Traffic Anomaly Detection: A Revisiting to Gaussian Process and Sparse Representation., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 107 (1): 125-133 (January 2024)Layered lossless video coding based on Slepian-Wolf theorem., and . ISPACS, page 652-657. IEEE, (2015)Slepian-Wolf video coding with resolution-progressive transmission., and . ISPACS, page 170-175. IEEE, (2017)Privacy-Preserving Network BMI Decoding of Covert Spatial Attention., , and . ICSPCS, page 1-8. IEEE, (2018)A Failure-Tolerant and Spectrum-Efficient Wireless Data Center Network Design for Improving Performance of Big Data Mining., , , , , and . VTC Spring, page 1-5. IEEE, (2015)A study on non-octave resolution conversion based on JPEG2000 extensions., , , and . ICASSP (3), page 69-72. IEEE, (2004)Low-Density Generator Matrix Codes for IP Packet Video Streaming with Backward Compatibility., , , , , and . ICC, page 1-5. IEEE, (2011)