Author of the publication

HEMIN: A Cryptographic Approach for Private k-NN Classification.

, , and . DMIN, page 500-505. CSREA Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PlanIt: A Crowdsourcing Approach for Learning to Plan Paths from Large Scale Preference Feedback., , and . CoRR, (2014)Robotic Object Detection: Learning to Improve the Classifiers Using Sparse Graphs for Path Planning., , and . IJCAI, page 2072-2078. IJCAI/AAAI, (2011)An integrated framework for enhancing privacy in online social networks., , and . COMPUTE, page 5:1-5:6. ACM, (2013)An efficient and secure protocol for DTV broadcasts.. SIN, page 288-292. ACM, (2009)Towards Logically and Physically Secure Public-Key Infrastructures., and . INDOCRYPT, volume 2551 of Lecture Notes in Computer Science, page 122-134. Springer, (2002)Reed Solomon Codes for Digital Fingerprinting., , and . INDOCRYPT, volume 2551 of Lecture Notes in Computer Science, page 163-175. Springer, (2002)Learning Spatio-Temporal Structure from RGB-D Videos for Human Activity Detection and Anticipation., and . ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, page 792-800. JMLR.org, (2013)Watch-Bot: Unsupervised learning for reminding humans of forgotten actions., , , , and . ICRA, page 2479-2486. IEEE, (2016)PlanIt: A crowdsourcing approach for learning to plan paths from large scale preference feedback., , , and . ICRA, page 877-884. IEEE, (2015)Identity Based Strong Designated Verifier Signature Scheme., , and . Informatica, 18 (2): 239-252 (2007)