Personensuche
X
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
1
Low-Cost Hiding of the Query Pattern:
, In:
?
Computational Intelligence Methods for Bioinformatics and Biostatistics; Lecture Notes in Computer Science ,
2
Committee-Based Active Learning to Select Negative Examples..:
, In:
?
2020 IEEE European Symposium on Security and Privacy (EuroS&P) ,
3
Differentially Private Two-Party Set Operations:
, In:
?
Proceedings of the 2019 9th International Conference on Biomedical Engineering and Technology ,
4
Analysis of Novel Annotations in the Gene Ontology for Boos..:
, In:
?
Proceedings of the 13th International Conference on Availability, Reliability and Security ,
5
An Efficient Cryptography-Based Access Control Using Inner-..:
, In:
?
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing ,
6
Efficient Implementation of a Proxy-based Protocol for Data..:
, In:
?
2015 IEEE Trustcom/BigDataSE/ISPA ,
7
Data sharing on the cloud: A scalable proxy-based protocol ..:
, In:
?
Climate Change and Cooling Cities; Urban Sustainability ,
8
Traditional Dwellings in Four Middle Eastern Cities: Adapta..:
, In:
?
2022 IEEE 21st International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC) ,
9
Adaptive Regularization in ANN for Condition Monitoring and..:
, In:
?
2022 IEEE World AI IoT Congress (AIIoT) ,
10