Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Restricted Local Differential Privacy for Distribution Estimation with High Data Utility., and . CoRR, (2018)Localization Attacks Using Matrix and Tensor Factorization., and . IEEE Trans. Inf. Forensics Secur., 11 (8): 1647-1660 (2016)Toward Evaluating Re-identification Risks in the Local Privacy Model., and . CoRR, (2020)Locally Differentially Private Analysis of Graph Statistics., , and . CoRR, (2020)A Signature Scheme with a Fuzzy Private Key., , , , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 105-126. Springer, (2015)Automatic Tuning of Privacy Budgets in Input-Discriminative Local Differential Privacy., and . IEEE Internet Things J., 10 (18): 15990-16005 (September 2023)CARGO: Crypto-Assisted Differentially Private Triangle Counting without Trusted Servers., , , , and . CoRR, (2023)Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces., , and . IEEE Trans. Inf. Forensics Secur., 12 (3): 689-704 (2017)A Secure and Practical Signature Scheme for Blockchain Based on Biometrics., , , , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 877-891. Springer, (2017)How to Handle Excessively Anonymized Datasets., , , , , , , and . J. Inf. Process., (2018)