Author of the publication

NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols.

, , , , and . Complex., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Automated Fiqh School Authorship Attribution.. CICLing (1), volume 13396 of Lecture Notes in Computer Science, page 124-130. Springer, (2018)Arabic Fake News Detection: Comparative Study of Neural Networks and Transformer-Based Approaches., , , , and . Complex., (2021)Exploring Arabic Pre-Trained Language Models for Arabic Abstractive Text Summarization., and . SNAMS, page 1-7. IEEE, (2023)NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols., , , , and . Complex., (2021)Agile Transformation for Capstone Projects: Preparing Graduates for the Job Market., , and . CSCI, page 1121-1124. IEEE, (2021)CURONTO: an ontological model for curriculum representation., , and . ITiCSE, page 358. ACM, (2013)On the evaluation of linguistic ontological models: An application on the SemQ ontology., , , and . ICDIM, page 341-345. IEEE, (2012)Arib$@$QALB-2015 Shared Task: A Hybrid Cascade Model for Arabic Spelling Error Detection and Correction., , , and . ANLP@ACL, page 127-132. Association for Computational Linguistics, (2015)Automatic Generation of Semantic Features and Lexical Relations Using OWL Ontologies., , , and . NLDB, volume 6716 of Lecture Notes in Computer Science, page 15-26. Springer, (2011)An approach to compare two ontological models for representing quranic words., , , , and . iiWAS, page 674-678. ACM, (2010)