Author of the publication

On the Retrieval of Wikipedia Articles Containing Claims on Controversial Topics.

, , , , , and . WWW (Companion Volume), page 991-996. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HE-PEx: Efficient Machine Learning under Homomorphic Encryption using Pruning, Permutation and Expansion., , , , , , , , , and 1 other author(s). CoRR, (2022)Complex Encoded Tile Tensors: Accelerating Encrypted Analytics., , , , and . IEEE Secur. Priv., 20 (5): 35-43 (2022)Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption., , , , , and . CCS, page 3567-3569. ACM, (2023)Hartigan's K-Means Versus Lloyd's K-Means - Is It Time for a Change?, , and . IJCAI, page 1677-1684. IJCAI/AAAI, (2013)Generating One-Hot Maps Under Encryption., , , , and . CSCML, volume 13914 of Lecture Notes in Computer Science, page 96-116. Springer, (2023)A Cloud-Based Anomaly Detection for IoT Big Data., , , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 87-104. Springer, (2020)Anomaly Detection in Large Databases Using Behavioral Patterning., , , , , , , , and . ICDE, page 1140-1149. IEEE Computer Society, (2017)Identifying malicious activities from system execution traces., , , and . IBM J. Res. Dev., 60 (4): 5 (2016)The Quality Preserving Database: A Computational Framework for Encouraging Collaboration, Enhancing Power and Controlling False Discovery., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 8 (5): 1431-1437 (2011)E2E near-standard and practical authenticated transciphering., , , , , and . IACR Cryptol. ePrint Arch., (2023)