Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Private Information Retrieval Over Unsynchronized Databases., and . J. Sel. Topics Signal Processing, 9 (7): 1229-1239 (2015)InfoGAN-CR: Disentangling Generative Adversarial Networks with Contrastive Regularizers., , , and . CoRR, (2019)Hiding the Rumor Source., , , , and . CoRR, (2015)Semi-Definite Programming Relaxation for Non-Line-of-Sight Localization, , and . CoRR, (2012)One-Way Private Media Search on Public Databases: The Role of Signal Processing., , and . IEEE Signal Process. Mag., 30 (2): 53-61 (2013)Deconstructing the Blockchain to Approach Physical Limits., , , , and . IACR Cryptology ePrint Archive, (2018)Toward efficient, privacy-aware media classification on public databases., , , and . ICMR, page 49. ACM, (2014)Prism: Deconstructing the Blockchain to Approach Physical Limits., , , , and . CCS, page 585-602. ACM, (2019)Towards Oblivious Network Analysis using Generative Adversarial Networks., , , , , , and . HotNets, page 43-51. ACM, (2019)Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts., , , , and . FOCI, USENIX Association, (2013)