Author of the publication

A Differentially Private Matching Scheme for Pairing Similar Users of Proximity Based Social Networking applications.

, , and . HICSS, page 1-8. ScholarSpace / AIS Electronic Library (AISeL), (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary Game of Knowledge Sharing in the Advanced Manufacturing Industry., , and . Int. J. Distributed Syst. Technol., 13 (4): 1-13 (2022)No peeking: privacy-preserving demand response system in smart grids., , , and . Int. J. Parallel Emergent Distributed Syst., 29 (3): 290-315 (2014)Complementary Learning Subnetworks for Parameter-Efficient Class-Incremental Learning., and . CoRR, (2023)An efficient group key establishment in location-aided mobile ad hoc networks., and . PE-WASUN, page 57-64. ACM, (2005)A framework to mitigate airliner risk in air traffic management., and . CNS, page 324-332. IEEE, (2016)Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks., and . Int. J. Netw. Secur., 18 (5): 946-959 (2016)P3: Privacy Preservation Protocol for Automatic Appliance Control Application in Smart Grid., , , and . IEEE Internet Things J., 1 (5): 414-429 (2014)Stochastic configuration networks with block increments for data modeling in process industries., , , and . Inf. Sci., (2019)Towards Continual Learning Desiderata via HSIC-Bottleneck Orthogonalization and Equiangular Embedding., , , , , and . AAAI, page 13464-13473. AAAI Press, (2024)A solution based analysis of attack vectors on smart home systems., and . SSIC, page 1-6. IEEE, (2015)