Author of the publication

Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment.

, , , , , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 451-471. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Upper Bounds on Systematic-Length for Linear Minimum Storage Regenerating Codes., , and . CoRR, (2016)Security Concerns in Minimum Storage Cooperative Regenerating Codes., , and . IEEE Trans. Inf. Theory, 62 (11): 6218-6232 (2016)Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database., , , , and . IEEE Access, (2018)Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments., , , and . World Wide Web, 22 (1): 101-123 (2019)Bitcoin Fast Payment Protocol Based on Chameleon Authentication Tree., , , , and . ICCEIC, volume 3344 of CEUR Workshop Proceedings, page 161-167. CEUR-WS.org, (2022)Research on the Application of Reinforcement Learning in Network Security., , , , , and . ICCEIC, page 31-34. IEEE, (2023)Lightweight edge-based kNN privacy-preserving classification scheme in cloud computing circumstance., , , , and . Concurr. Comput. Pract. Exp., (2020)Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT., , , , , and . IEEE Trans. Emerg. Top. Comput., 10 (2): 933-947 (2022)The Effect of Matching Block Resolution on IP Softcore Hardware Trojans Map Detection., , , , and . ICAIT, page 289-294. IEEE, (2023)On Secrecy Capacity of Minimum Storage Regenerating Codes., , and . IEEE Trans. Inf. Theory, 63 (3): 1510-1524 (2017)