Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-algebraic Range Reporting and Emptiness Searching with Applications, and . CoRR, (2009)Privacy Preserving Feature Selection for Sparse Linear Regression., , , , and . Proc. Priv. Enhancing Technol., 2024 (1): 300-313 (January 2024)Privacy-Preserving Federated Learning over Vertically and Horizontally Partitioned Data for Financial Anomaly Detection., , , , , , , , , and 5 other author(s). CoRR, (2023)Semialgebraic Range Reporting and Emptiness Searching with Applications., and . SIAM J. Comput., 40 (4): 1045-1074 (2011)Linear-Regression on Packed Encrypted Data in the Two-Server Model., , , and . WAHC@CCS, page 21-32. ACM, (2019)Ray shooting and stone throwing with near-linear storage., and . Comput. Geom., 30 (3): 239-252 (2005)Ray Shooting and Stone Throwing., and . ESA, volume 2832 of Lecture Notes in Computer Science, page 470-481. Springer, (2003)E2E near-standard and practical authenticated transciphering., , , , , and . IACR Cryptol. ePrint Arch., (2023)Improved construction of vertical decompositions of three-dimensional arrangements., and . SCG, page 283-292. ACM, (2002)Scalable Secure Computation of Statistical Functions with Applications to k-Nearest Neighbors., , and . CoRR, (2018)