Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outsourced Biometric Identification With Privacy., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (10): 2448-2463 (2018)Differential Privacy for Text Analytics via Natural Text Sanitization., , , , , and . ACL/IJCNLP (Findings), volume ACL/IJCNLP 2021 of Findings of ACL, page 3853-3866. Association for Computational Linguistics, (2021)AdvDDoS: Zero-Query Adversarial Attacks Against Commercial Speech Recognition Systems., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Shielding Graph for eXact Analytics With SGX., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 5102-5112 (November 2023)Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval., , , , and . INFOCOM, page 1-9. IEEE, (2017)Machine Unlearning of Pre-trained Large Language Models., , , , , , and . CoRR, (2024)Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning., , , , , , and . ADMA (2), volume 14177 of Lecture Notes in Computer Science, page 393-407. Springer, (2023)CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud., , , , , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 186-205. Springer, (2015)VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service., , , , , , , and . CoRR, (2019)Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions., , , , , and . CoRR, (2020)