Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Image Retrieval Based on Additive Secret Sharing., , , , and . CoRR, (2020)Efficient Privacy-Preserving Computation Based on Additive Secret Sharing., , , , and . CoRR, (2020)BDFL: A Byzantine-Fault-Tolerance Decentralized Federated Learning Method for Autonomous Vehicle., , , and . IEEE Trans. Veh. Technol., 70 (9): 8639-8652 (2021)RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust., , , , and . J. Inf. Secur. Appl., (2019)Unforgeability of an improved certificateless signature scheme in the standard model., , , , and . IET Inf. Secur., 8 (5): 273-276 (2014)Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields., , , , , and . IEEE Trans. Inf. Theory, 65 (10): 6819-6826 (2019)An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks., , , , , and . IEEE Trans. Vehicular Technology, 69 (5): 4689-4699 (2020)Long Optimal or Small-Defect LRC Codes with Unbounded Minimum Distances., , and . CoRR, (2019)Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients., , , , , , and . CoRR, (2022)A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network., , , , and . CoRR, (2022)