Author of the publication

MFAI: A Scalable Bayesian Matrix Factorization Approach to Leveraging Auxiliary Information.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved group key transfer protocols from the protocol of Harn et al.. Secur. Commun. Networks, 6 (12): 1471-1477 (2013)Extended Prony Analysis on Power System Oscillation Under a Near-Resonance Condition., , , , and . CoRR, (2020)Leakage resilient CCA secure IBE with all-but-one lossy filter.. Int. J. Ad Hoc Ubiquitous Comput., 21 (4): 266-272 (2016)A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity.. Future Gener. Comput. Syst., (2018)An Identity-Based Data Aggregation Protocol for the Smart Grid.. IEEE Trans. Ind. Informatics, 13 (5): 2428-2435 (2017)A Resilient Power System Operation Strategy Considering Transmission Line Attacks., , , , , and . IEEE Access, (2018)Accurate Power Sharing and Synthetic Inertia Control for DC Building Microgrids With Guaranteed Performance., , , , , and . IEEE Access, (2019)Fast multicast scheme with secure network coding in cloud data centers., , , , , and . Comput. Sci. Inf. Syst., 13 (2): 531-545 (2016)CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency., and . ISC, volume 9290 of Lecture Notes in Computer Science, page 319-335. Springer, (2015)Ship detection for Radarsat-2 ScanSAR data using DoG scale-space., , , , , and . IGARSS, page 1881-1884. IEEE, (2013)