Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inverse transport calculations in optical imaging with subspace optimization algorithms., and . J. Comput. Phys., (2014)Distributed Privacy-Preserving Access Control in Sensor Networks., , and . IEEE Trans. Parallel Distributed Syst., 23 (8): 1427-1438 (2012)Attribute-based fine-grained access control with efficient revocation in cloud storage systems., , and . AsiaCCS, page 523-528. ACM, (2013)Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations., , , and . IEEE Trans. Parallel Distributed Syst., 24 (6): 1172-1181 (2013)A range characterization of the single-quadrant ADRT., , and . CoRR, (2020)Blind Recognition of Touched Keys on Mobile Devices., , , , , and . ACM Conference on Computer and Communications Security, page 1403-1414. ACM, (2014)Silent Two-party Computation Assisted by Semi-trusted Hardware., , , , and . IACR Cryptol. ePrint Arch., (2020)Disguised as Privacy: Data Poisoning Attacks Against Differentially Private Crowdsensing Systems., , , , , and . IEEE Trans. Mob. Comput., 22 (9): 5155-5169 (September 2023)Guest Editorial Special Issue on Security for IoT: The State of the Art., , , , and . IEEE Internet Things J., 1 (5): 369-371 (2014)FDINet: Protecting against DNN Model Extraction via Feature Distortion Index., , , , , and . CoRR, (2023)