Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol., , , , , , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 16 (1): 113-123 (2019)LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference., , , , , , , , , and 1 other author(s). CoRR, (2023)Against Membership Inference Attack: Pruning is All You Need., , , , , , , and . IJCAI, page 3141-3147. ijcai.org, (2021)A Fast and Effective Memristor-Based Method for Finding Approximate Eigenvalues and Eigenvectors of Non-negative Matrices., , , , and . ISVLSI, page 563-568. IEEE Computer Society, (2018)A local approach of adaptive affinity propagation clustering for large scale data., , , and . IJCNN, page 2998-3002. IEEE Computer Society, (2009)Privacy-preserving biomedical data dissemination via a hybrid approach., , and . AMIA, AMIA, (2018)Encrypted Data Management Systems with tunable Privacy.. Duke University, Durham, NC, USA, (2023)base-search.net (ftdukeunivdsp:oai:localhost:10161/29132).Poirot: private contact summary aggregation: poster abstract., , , , , , , , and . SenSys, page 774-775. ACM, (2020)IncShrink: Architecting Efficient Outsourced Databases using Incremental MPC and Differential Privacy., , , and . SIGMOD Conference, page 818-832. ACM, (2022)TAG: Gradient Attack on Transformer-based Language Models., , , , , , , and . EMNLP (Findings), page 3600-3610. Association for Computational Linguistics, (2021)