Author of the publication

A Study from the Data Anonymization Competition Pwscup 2015.

, , , , , and . DPM/QASA@ESORICS, volume 9963 of Lecture Notes in Computer Science, page 230-237. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Functionally specialized CMA-ES: a modification of CMA-ES based on the specialization of the functions of covariance matrix adaptation and step size adaptation., , , and . GECCO, page 479-486. ACM, (2008)Link analysis for private weighted graphs., and . SIGIR, page 235-242. ACM, (2009)Adaptive isolation model using data clustering for multimodal function optimization., , and . GECCO, page 1417-1424. ACM, (2005)Latent variable crossover for k-tablet structures and its application to lens design problems., and . GECCO, page 1347-1354. ACM, (2005)Differentially Private Chi-squared Test by Unit Circle Mechanism., , and . ICML, volume 70 of Proceedings of Machine Learning Research, page 1761-1770. PMLR, (2017)Differentially Private Empirical Risk Minimization with Input Perturbation., , and . DS, volume 10558 of Lecture Notes in Computer Science, page 82-90. Springer, (2017)Privacy Preserving Semi-supervised Learning for Labeled Graphs., and . ECML/PKDD (1), volume 6911 of Lecture Notes in Computer Science, page 124-139. Springer, (2011)More Practical Privacy-Preserving Machine Learning as A Service via Efficient Secure Matrix Multiplication., and . WAHC@CCS, page 25-36. ACM, (2018)Few-Shot Image-to-Semantics Translation for Policy Transfer in Reinforcement Learning., , , and . CoRR, (2023)Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism., , , , and . AISec@CCS, page 55-56. ACM, (2017)