Search for persons
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
3
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
4
Principal Component Analysis over the Boolean Circuit Withi..:
, In:
?
2023 International Conference on Advanced Technologies for Communications (ATC) ,
5
Privacy-preserving continuous learning for MobileSAM via Fe..:
, In:
?
2023 International Conference on Advanced Technologies for Communications (ATC) ,
6
Federated Learning with Diffusion Models for Privacy-Sensit..:
, In:
?
Numerical Weather Prediction: East Asian Perspectives; Springer Atmospheric Sciences ,
7
Reducing Model Uncertainty in Physical Parameterizations: C..:
, In:
?
Diabetes Management in Hospitalized Patients; Contemporary Endocrinology ,
8
Perioperative Management of Blood Glucose in Adults with Di..:
, In:
?
2022 IEEE Spoken Language Technology Workshop (SLT) ,
9
Inter-KD: Intermediate Knowledge Distillation for CTC-Based..:
, In:
?
Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023 ,
10
Discretization Error Reduction for High Precision Torus Ful..:
, In:
?
2023 14th International Conference on Information and Communication Technology Convergence (ICTC) ,
11
Secure Dimensionality Reduction: Applying Linear Discrimina..:
, In:
?
The AFS Textbook of Foregut Disease ,
12
Diagnosis and Management of Gastric Intestinal Metaplasia:
, In:
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
13
Invasion of location privacy using online map services and ..:
, In:
?
2022 The 3rd European Symposium on Software Engineering ,
14
Community Privacy using the Sparse Vector Technique for Gra..:
, In:
?
2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS) ,
15