Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees., and . PAKDD, volume 4426 of Lecture Notes in Computer Science, page 296-307. Springer, (2007)Secure multi-party computation problems and their applications: a review and open problems., and . NSPW, page 13-22. ACM, (2001)Compac: enforce component-level access control in android., , , , and . CODASPY, page 25-36. ACM, (2014)Mediums: visual integrity preserving framework., , and . CODASPY, page 309-316. ACM, (2013)AFrame: isolating advertisements from mobile applications in Android., , and . ACSAC, page 9-18. ACM, (2013)Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References., , , , , , , , and . CCS, page 1248-1259. ACM, (2015)A novel edge tracking approach for cornea in optical coherence tomography anterior chamber images., , and . EMBC, page 1434-1437. IEEE, (2013)Lunar DEM Super-resolution reconstruction via sparse representation., , and . CISP-BMEI, page 1-5. IEEE, (2017)Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data., and . Web Intelligence, page 725-731. IEEE Computer Society, (2005)Automatic Reputation Computation through Document Analysis: A Social Network Approach., , , , , , and . ASONAM, page 559-560. IEEE Computer Society, (2011)