Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A data center model for testing control and optimization algorithms., , , , and . IECON, page 7165-7170. IEEE, (2017)Energy modeling for data center infrastructure. KTH, (2017)Efficient obfuscation for CNF circuits and applications in cloud computing., , , and . Soft Comput., 23 (6): 2061-2072 (2019)Binomial Difference Ideals., , and . CoRR, (2016)Anonymous Post-Quantum Cryptocash., , , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 461-479. Springer, (2018)Occluded person re-identification with deep learning: A survey and perspectives., , , , and . Expert Syst. Appl., (2024)Visual Symbol Attention and Cross-Cultural Communication - A Case Study of Catering Commercial Graphic Advertising., and . HCI (11), volume 11576 of Lecture Notes in Computer Science, page 440-457. Springer, (2019)Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform., and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 111-119. Springer, (2012)Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training., , , , , , and . World Wide Web (WWW), 26 (5): 2691-2707 (September 2023)Battery Capacity Knee Identification Using Unsupervised Time Series Segmentation., , , and . CoRR, (2023)