Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage., , , and . Int. J. Grid Util. Comput., 14 (5): 469-479 (2023)An improved multi-copy cloud data auditing scheme and its application., , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (3): 120-130 (March 2023)NormKD: Normalized Logits for Knowledge Distillation., , , , , , and . CoRR, (2023)Training-Time-Friendly Network for Real-Time Object Detection., , , , , and . AAAI, page 11685-11692. AAAI Press, (2020)Algorithm-hardware co-design of single shot detector for fast object detection on FPGAs., , , , and . ICCAD, page 57. ACM, (2018)Toward Secure K-means Clustering Based on Homomorphic Encryption in Cloud., , , , and . EIDWT, volume 118 of Lecture Notes on Data Engineering and Communications Technologies, page 52-62. Springer, (2022)SCALoss: Side and Corner Aligned Loss for Bounding Box Regression., , , , and . CoRR, (2021)Few-shot Hybrid Domain Adaptation of Image Generators., , , , , , , , , and . CoRR, (2023)Outsourced Secure Face Recognition Based on CKKS Homomorphic Encryption in Cloud Computing., , , , and . Int. J. Mob. Comput. Multim. Commun., 12 (3): 27-43 (2021)Design and Implementation of Secure File Transfer System Based on Java., , , and . 3PGCIC, volume 158 of Lecture Notes in Networks and Systems, page 366-375. Springer, (2020)