From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge., , и . Proc. Priv. Enhancing Technol., 2016 (4): 373-388 (2016)Propagation = Lazy Clause Generation., , и . CP, том 4741 из Lecture Notes in Computer Science, стр. 544-558. Springer, (2007)Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget., , , , , и . CoRR, (2024)Challenges towards the Next Frontier in Privacy., , , , , , , , , и 14 other автор(ы). CoRR, (2023)Propagation via lazy clause generation., , и . Constraints An Int. J., 14 (3): 357-391 (2009)Attribute Privacy: Framework and Mechanisms., , и . CoRR, (2020)Contamination Attacks and Mitigation in Multi-Party Machine Learning., и . NeurIPS, стр. 6604-6616. (2018)Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees., , , и . SCN, том 9841 из Lecture Notes in Computer Science, стр. 216-236. Springer, (2016)Leakage of Dataset Properties in Multi-Party Machine Learning., , и . USENIX Security Symposium, стр. 2687-2704. USENIX Association, (2021)Analyzing Information Leakage of Updates to Natural Language Models., , , , , , , и . CCS, стр. 363-375. ACM, (2020)