From post

A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing.

, , , , и . ICA3PP (1), том 11944 из Lecture Notes in Computer Science, стр. 345-358. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing., , , , и . ICA3PP (1), том 11944 из Lecture Notes in Computer Science, стр. 345-358. Springer, (2019)Enhancing Network Intrusion Detection Through the Application of the Dung Beetle Optimized Fusion Model., , , , и . IEEE Access, (2024)Xformer: Hybrid X-Shaped Transformer for Image Denoising., , , , , и . CoRR, (2023)Cyber situation perception for Internet of Things systems based on zero-day attack activities recognition within advanced persistent threat., , , и . Concurr. Comput. Pract. Exp., (2022)Hyprogan: Breaking the Dimensional wall From Human to Anime., , , , и . ICIP, стр. 2066-2070. IEEE, (2022)Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension., , и . SocialSec, том 1095 из Communications in Computer and Information Science, стр. 123-138. Springer, (2019)Defending against Membership Inference Attacks in Federated learning via Adversarial Example., , , и . MSN, стр. 153-160. IEEE, (2021)Edge-based Protection Against Malicious Poisoning for Distributed Federated Learning., , , и . CSCWD, стр. 459-464. IEEE, (2022)Accurate Image Restoration with Attention Retractable Transformer., , , , , и . CoRR, (2022)ADFL: Defending backdoor attacks in federated learning via adversarial distillation., , , , и . Comput. Secur., (сентября 2023)