Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Activation functions in neural networks, , and . towards data science, 6 (12): 310--316 (2017)Confidential Boosting with Random Linear Classifiers for Outsourced User-Generated Data., and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 41-65. Springer, (2019)Image Disguising for Protecting Data and Model Confidentiality in Outsourced Deep Learning., , and . CLOUD, page 71-77. IEEE, (2021)Ocular Disease Recognition using Machine Learning., , , , , and . ICCCNT, page 1-10. IEEE, (2023)SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications., , and . Proc. Priv. Enhancing Technol., 2021 (1): 5-20 (2021)Confidential Machine Learning on Untrusted Platforms: A Survey., and . CoRR, (2020)A Comparative Study of Image Disguising Methods for Confidential Outsourced Learning., , and . CoRR, (2023)PrivateGraph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud., , and . IEEE Trans. Knowl. Data Eng., 31 (5): 981-995 (2019)SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications., , and . CoRR, (2020)Privacy-Preserving Boosting with Random Linear Classifiers., and . ACM Conference on Computer and Communications Security, page 2294-2296. ACM, (2018)