Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online/offline remote data auditing with strong key-exposure resilience for cloud storage., , , , , and . Comput. Stand. Interfaces, (March 2024)Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud., , and . Sci. China Inf. Sci., 61 (12): 122104:1-122104:15 (2018)Privacy Prediction of Lightweight Convolutional Neural Network., , , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 524-537. Springer, (2020)Efficient forward secure searchable encryption supporting multi-keyword query., , , and . CONF-CDS, page 12:1-12:9. ACM, (2021)A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability., , , , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 380-398. Springer, (2023)I/O-efficient techniques for computing pagerank., , and . CIKM, page 549-557. ACM, (2002)Analysis of geographic queries in a search engine log., , , and . LocWeb, volume 300 of ACM International Conference Proceeding Series, page 49-56. ACM, (2008)Secure and efficient big data deduplication in fog computing., , , , and . Soft Comput., 24 (8): 5671-5682 (2020)Toward Comparable Homomorphic Encryption for Crowd-sensing Network., , , , and . IACR Cryptol. ePrint Arch., (2020)A convolutional neural network based Android malware detection method with dynamic fine-tuning., , , and . ITNAC, page 300-305. IEEE, (2022)