Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Activity Recognition for Indoor Fall Detection in 360-Degree Videos Using Deep Learning Techniques., , , , , , , , and . CVIP (2), volume 1024 of Advances in Intelligent Systems and Computing, page 417-429. Springer, (2018)The Web and Social Networks., , , and . Computer, 35 (11): 32-36 (2002)"I know what you did last summer": query logs and user privacy., , , and . CIKM, page 909-914. ACM, (2007)Vanity fair: privacy in querylog bundles., , , and . CIKM, page 853-862. ACM, (2008)A novel deep learning architecture for sentiment classification., , and . RAIT, page 511-516. IEEE, (2016)Sparsity-Preserving Differentially Private Training of Large Embedding Models., , , , , , and . CoRR, (2023)Separating Computational and Statistical Differential Privacy (Under Plausible Assumptions)., , , , and . CoRR, (2023)New Method for Constructing a Visibility Graph-Network in 3D Space and a New Hybrid System of Modeling., , , , , and . Comput. Informatics, 36 (5): 1107-1126 (2017)On nonlinear estimation in presence of non-Gaussian Noise.. ICASSP, page 648-651. IEEE, (1985)Mechanism Design for Complexity-Constrained Bidders., , and . WINE, volume 5929 of Lecture Notes in Computer Science, page 513-520. Springer, (2009)