Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys., , , , , and . IEEE Trans. Serv. Comput., 10 (5): 826-838 (2017)Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack., , , , , and . CoRR, (2020)Speedster: A TEE-assisted State Channel System., , , and . CoRR, (2021)Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation., , , , and . USENIX Security Symposium, page 1739-1756. USENIX Association, (2023)Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test., , , , , , , , , and 5 other author(s). GLOBECOM, page 1-6. IEEE, (2021)Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking., , , , , , and . AsiaCCS, page 71-82. ACM, (2013)RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks., , , , , , and . NeurIPS, (2023)Undercutting Bitcoin Is Not Profitable., , , and . CoRR, (2020)Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data., , , , and . INFOCOM, page 2110-2118. IEEE, (2015)Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns., , , , , , , , and . IEEE Internet Things J., 10 (16): 14197-14211 (August 2023)