Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complex Encoded Tile Tensors: Accelerating Encrypted Analytics., , , , and . IEEE Secur. Priv., 20 (5): 35-43 (2022)HE-PEx: Efficient Machine Learning under Homomorphic Encryption using Pruning, Permutation and Expansion., , , , , , , , , and 1 other author(s). CoRR, (2022)Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption., , , , , and . CCS, page 3567-3569. ACM, (2023)A Cloud-Based Anomaly Detection for IoT Big Data., , , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 87-104. Springer, (2020)Generating One-Hot Maps Under Encryption., , , , and . CSCML, volume 13914 of Lecture Notes in Computer Science, page 96-116. Springer, (2023)Hartigan's K-Means Versus Lloyd's K-Means - Is It Time for a Change?, , and . IJCAI, page 1677-1684. IJCAI/AAAI, (2013)Anomaly Detection in Large Databases Using Behavioral Patterning., , , , , , , , and . ICDE, page 1140-1149. IEEE Computer Society, (2017)The Quality Preserving Database: A Computational Framework for Encouraging Collaboration, Enhancing Power and Controlling False Discovery., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 8 (5): 1431-1437 (2011)Identifying malicious activities from system execution traces., , , and . IBM J. Res. Dev., 60 (4): 5 (2016)E2E near-standard and practical authenticated transciphering., , , , , and . IACR Cryptol. ePrint Arch., (2023)