Author of the publication

Federated Learning of User Verification Models Without Sharing Embeddings.

, , , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 4328-4336. PMLR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of fuzzy subtractive clustering for optimal transient performance of automatic generation control in restructured power system., , and . J. Intell. Fuzzy Syst., 26 (3): 1155-1166 (2014)Fast restoration of natural images corrupted by high-density impulse noise., and . EURASIP J. Image Video Process., (2013)Real-Time Impulse Noise Suppression from Images Using an Efficient Weighted-Average Filtering., , and . IEEE Signal Process. Lett., 22 (8): 1050-1054 (2015)Image Inpainting Using Sparsity of the Transform Domain, , and . CoRR, (2010)A geospatial workflow for the assessment of public transit system performance using near real-time data., , , and . Trans. GIS, 26 (4): 1642-1664 (2022)A Routing Protocol for Wireless Sensor Networks with Reliable Delivery of Data., and . DSDIS, page 632-635. IEEE Computer Society, (2015)Learning Temporal Dependence from Time-Series Data with Latent Variables., , , and . DSAA, page 253-262. IEEE, (2016)A Game Theoretical Framework for Inter-process Adversarial Intervention Detection., , , and . GameSec, volume 11199 of Lecture Notes in Computer Science, page 486-507. Springer, (2018)Semantic Adversarial Examples., and . CVPR Workshops, page 1614-1619. Computer Vision Foundation / IEEE Computer Society, (2018)A routing protocol for wireless sensor networks with load balancing., and . EIT, page 156-161. IEEE, (2016)