Search for persons
X
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
1
Differentially Private Friends Recommendation:
, In:
?
2023 IEEE 9th International Conference on Network Softwarization (NetSoft) ,
2
Automated Placement of In-Network ACL Rules:
, In:
?
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium ,
3
Automatically Distributing and Updating In-Network Manageme..:
, In:
?
2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS) ,
4
Privacy Preserving Recommendations for Social Networks:
, In:
?
2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) ,
5
Deciding Whether two Codes Have the Same Ambiguities is in ..:
, In:
?
Data and Applications Security and Privacy XXXV; Lecture Notes in Computer Science ,
6
Divide-and-Learn: A Random Indexing Approach to Attribute I..:
, In:
?
2020 IEEE 19th International Symposium on Network Computing and Applications (NCA) ,
8
Efficient Distribution of Security Policy Filtering Rules i..:
, In:
?
Proceedings of the 35th Annual ACM Symposium on Applied Computing ,
9
You are what emojis say about your pictures : language-i..:
, In:
?
2020 16th International Conference on Network and Service Management (CNSM) ,
10
R2-D2: Filter Rule set Decomposition and Distribution in So..:
, In:
?
2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) ,
11
Double Mask: An Efficient Rule Encoding for Software Define..:
, In:
?
ADBIS, TPDL and EDA 2020 Common Workshops and Doctoral Consortium; Communications in Computer and Information Science ,
12
Your Age Revealed by Facebook Picture Metadata:
, In:
?
Lecture Notes in Computer Science; Database and Expert Systems Applications ,
13
Online Attacks on Picture Owner Privacy:
, In:
?
Lecture Notes in Computer Science; Automated Deduction – CADE 27 ,
15