Author of the publication

Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.

, , , , , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 374-388. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VCOS: A Novel Synergistic Oversampling Algorithm in Binary Imbalance Classification., , and . IEEE Access, (2019)An Improved Measurement of the Imbalanced Dataset., , , , , and . CLOUD, volume 10967 of Lecture Notes in Computer Science, page 365-376. Springer, (2018)Particle Swarm Optimisation in Feedforward Neural Network., and . ANNIMAB, page 327-332. Springer, (2000)An Effective Feature Selection Scheme via Genetic Algorithm Using Mutual Information., and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 73-80. Springer, (2005)Using PSO algorithm to evolve an optimum input subset for a SVM in time series forecasting., and . SMC, page 3793-3796. IEEE, (2005)An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II., , , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 603-612. Springer, (2019)A Fast Algorithm for Hiding High Utility Sequential Patterns., , , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1316-1322. IEEE, (2019)Decision Tree Based Approaches for Detecting Protein Complex in Protein Protein Interaction Network (PPI) via Link and Sequence Analysis., , , , , , , and . IEEE Access, (2018)HUSP-SP: Faster Utility Mining on Sequence Data., , , , and . CoRR, (2022)FinChain-BERT: A High-Accuracy Automatic Fraud Detection Model Based on NLP Methods for Financial Scenarios., , , , , , and . Inf., 14 (9): 499 (2023)