Author of the publication

Efficient Pruning for Machine Learning Under Homomorphic Encryption.

, , , , , , , , , , and . ESORICS (4), volume 14347 of Lecture Notes in Computer Science, page 204-225. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving Feature Selection for Sparse Linear Regression., , , , and . Proc. Priv. Enhancing Technol., 2024 (1): 300-313 (January 2024)Semi-algebraic Range Reporting and Emptiness Searching with Applications, and . CoRR, (2009)Privacy-Preserving Federated Learning over Vertically and Horizontally Partitioned Data for Financial Anomaly Detection., , , , , , , , , and 5 other author(s). CoRR, (2023)Ray Shooting and Stone Throwing., and . ESA, volume 2832 of Lecture Notes in Computer Science, page 470-481. Springer, (2003)Semialgebraic Range Reporting and Emptiness Searching with Applications., and . SIAM J. Comput., 40 (4): 1045-1074 (2011)Linear-Regression on Packed Encrypted Data in the Two-Server Model., , , and . WAHC@CCS, page 21-32. ACM, (2019)Ray shooting and stone throwing with near-linear storage., and . Comput. Geom., 30 (3): 239-252 (2005)E2E near-standard and practical authenticated transciphering., , , , , and . IACR Cryptol. ePrint Arch., (2023)Improved construction of vertical decompositions of three-dimensional arrangements., and . SCG, page 283-292. ACM, (2002)Scalable Secure Computation of Statistical Functions with Applications to k-Nearest Neighbors., , and . CoRR, (2018)