Author of the publication

How to protect reader lending privacy under a cloud environment: a technical method.

, , , , and . Libr. Hi Tech, 40 (6): 1746-1765 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ESPSA: A prediction-based algorithm for streaming time series segmentation., , , , and . Expert Syst. Appl., 41 (14): 6098-6105 (2014)Discovering shapelets with key points in time series classification., , and . Expert Syst. Appl., (2019)Stimulating trust cooperation in edge services: An evolutionary tripartite game., , , , and . Eng. Appl. Artif. Intell., (2022)A privacy protection approach for XML-based archives management in a cloud environment., , , and . Electron. Libr., 37 (6): 970-983 (2019)A projective clustering algorithm based on significant local dense areas., , , , , and . IJCNN, page 1-8. IEEE, (2012)Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation., , , , and . IEEE Trans. Serv. Comput., 11 (3): 493-506 (2018)Selecting Valuable Customers for Merchants in E-Commerce Platforms., , , , and . ICDM, page 1281-1286. IEEE Computer Society, (2016)Multilevel threshold image segmentation for COVID-19 chest radiography: A framework using horizontal and vertical multiverse optimization., , , , , , , , and . Comput. Biol. Medicine, (2022)Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems., , , , , and . Expert Syst. Appl., (September 2023)Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment., , , , , , and . IEEE Access, (2020)