Author of the publication

Secure Two-Party Rank Correlation Computations for Recommender Systems.

, , and . TrustCom/BigDataSE/ISPA (1), page 1022-1028. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Biometric-Based Authentication for Cloud Computing., and . CLOSER (Selected Papers), volume 367 of Communications in Computer and Information Science, page 86-101. Springer, (2012)Toward a fair indictment for sealed-bid auction with self-enforcing privacy., and . J. Supercomput., 74 (8): 3801-3819 (2018)Efficient Two-Party Integer Comparison With Block Vectorization Mechanism., , and . IEEE Access, (2021)Fooling the Textual Fooler via Randomizing Latent Representations., , , , , and . CoRR, (2023)Privacy-preserving similarity coefficients for binary data., and . Comput. Math. Appl., 65 (9): 1280-1290 (2013)Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks., , , , and . CoRR, (2023)Synthesizing Physical Backdoor Datasets: An Automated Framework Leveraging Deep Generative Models., , , , , , , and . CoRR, (2023)A Privacy-Preserving Framework for Surveillance Systems., , , and . ICCNS, page 91-98. ACM, (2020)Secure Two-Party Rank Correlation Computations for Recommender Systems., , and . TrustCom/BigDataSE/ISPA (1), page 1022-1028. IEEE, (2015)Secure Re-publication of Dynamic Big Data., and . CSS, volume 8300 of Lecture Notes in Computer Science, page 468-477. Springer, (2013)