From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Remote Verifiable Computation without Digital Secrets.. ASHES@CCS, стр. 1. ACM, (2022)Quantifying and Mitigating Privacy Risks for Tabular Generative Models., , , , , и . CoRR, (2024)Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD., , , и . ICML, том 97 из Proceedings of Machine Learning Research, стр. 6392-6400. PMLR, (2019)Leveraging Hardware Isolation for Process Level Access Control & Authentication., , , , и . SACMAT, стр. 133-141. ACM, (2017)A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon Decoding., , , и . AAECC, том 2227 из Lecture Notes in Computer Science, стр. 343-352. Springer, (2001)Watermark Estimation through Detector Analysis., , и . ICIP (1), стр. 425-429. IEEE Computer Society, (1998)A Linear Construction of Perfect Secret Sharing Schemes.. EUROCRYPT, том 950 из Lecture Notes in Computer Science, стр. 23-34. Springer, (1994)Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM., , , , , и . TCC (A2), том 9563 из Lecture Notes in Computer Science, стр. 145-174. Springer, (2016)Analysis of the Sensitivity Attack against Electronic Watermarks in Images., и . Information Hiding, том 1525 из Lecture Notes in Computer Science, стр. 258-272. Springer, (1998)Mitigating Synchronized Hardware Trojan Attacks in Smart Grids., , , , и . SPSR-SG@CPSWeek, стр. 35-40. ACM, (2017)