Author of the publication

Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection.

, , , and . IEEE Trans. Serv. Comput., 14 (4): 998-1012 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records., , , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 40-60. Springer, (2015)Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection., , , and . IEEE Trans. Serv. Comput., 14 (4): 998-1012 (2021)Adaptive Feature Fusion Networks for Origin-Destination Passenger Flow Prediction in Metro Systems., , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (5): 5296-5312 (May 2023)Quantifying predictability of sequential recommendation via logical constraints., , , , , and . Frontiers Comput. Sci., 17 (5): 175612 (October 2023)Enabling secure and effective near-duplicate detection over encrypted in-network storage., , , and . INFOCOM, page 1-9. IEEE, (2016)Fashion Meets Bot: What Should the Bot Wear?, , , , and . CSCWD, page 932-937. IEEE, (2022)Hierarchical Computing Network Collaboration Architecture for Industrial Internet of Things., , , , , , and . ICPADS, page 57-64. IEEE, (2022)Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices., , and . INFOCOM, page 2659-2667. IEEE, (2015)A Bandwidth-Efficient Middleware for Encrypted Deduplication., , , , and . DSC, page 1-8. IEEE, (2018)Energy-Latency Attacks to On-Device Neural Networks via Sponge Poisoning., , , and . CoRR, (2023)