Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collecting and Analyzing Data from Smart Device Users with Local Differential Privacy., , , , , and . CoRR, (2016)Cybersecurity Event Detection with New and Re-emerging Words., , , , , and . AsiaCCS, page 665-678. ACM, (2020)Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy., , , and . IEEE Trans. Knowl. Data Eng., 30 (9): 1770-1782 (2018)Canonical correlation analysis for irregularly and sparsely observed functional data., and . J. Multivar. Anal., (2015)MM-type smoothing spline estimators for principal functions., , and . Comput. Stat. Data Anal., (2013)Learning New Words from Keystroke Data with Local Differential Privacy., , , , and . IEEE Trans. Knowl. Data Eng., 32 (3): 479-491 (2020)#Twiti: Social Listening for Threat Intelligence., , , , , and . WWW, page 92-104. ACM / IW3C2, (2021)WristAcoustic: Through-Wrist Acoustic Response Based Authentication for Smartwatches., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (4): 167:1-167:34 (2022)Functional linear regression model with randomly censored data: Predicting conversion time to Alzheimer 's disease., , , , and . Comput. Stat. Data Anal., (2020)On Data Licenses for Open Source Threat Intelligence., , and . IEEE Secur. Priv., 20 (4): 8-22 (2022)