Author of the publication

Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic Encryption.

, , , and . ICCV, page 2059-2069. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zero-Aliasing Correlation Filters for Object Recognition., , , and . CoRR, (2014)Local Binary Convolutional Neural Networks., , and . CoRR, (2016)Emergence of Selective Invariance in Hierarchical Feed Forward Networks., , and . CoRR, (2017)Secure Face Matching Using Fully Homomorphic Encryption.. BTAS, page 1-10. IEEE, (2018)Neural Architecture Transfer., , , , , and . CoRR, (2020)Deep learning paradigm for prediction of stress distribution in damaged structural components with stress concentrations., , , , and . Adv. Eng. Softw., (2022)Towards Transmission-Friendly and Robust CNN Models over Cloud and Device., , , , , and . IEEE Trans. Mob. Comput., 22 (10): 6176-6189 (October 2023)Adversarial Representation Learning with Closed-Form Solvers., , and . ECML/PKDD (2), volume 12976 of Lecture Notes in Computer Science, page 731-748. Springer, (2021)Mechanics-Informed Autoencoder Enables Automated Detection and Localization of Unforeseen Structural Damage., , , , , and . CoRR, (2024)Constrained Sampling: Optimum Reconstruction in Subspace With Minimax Regret Constraint., , and . IEEE Trans. Signal Process., 67 (16): 4218-4230 (2019)