Author of the publication

Towards Encrypted In-Network Storage Services with Secure Near-Duplicate Detection.

, , , and . IEEE Trans. Serv. Comput., 14 (4): 998-1012 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crimson: A Data Management System to Support Evaluating Phylogenetic Tree Reconstruction Algorithms., , , , , and . VLDB, page 1231-1234. ACM, (2006)RRXF: Redundancy reducing XML storage in relations., , , and . VLDB, page 189-200. Morgan Kaufmann, (2003)Semi-Supervised Learning Based on Generative Adversarial Network and Its Applied to Lithology Recognition., , , , and . IEEE Access, (2019)An Improved Over-sampling Algorithm based on iForest and SMOTE., , and . ICSCA, page 75-80. ACM, (2019)Reservoir Parameter Prediction Using Optimized Seismic Attributes Based on Gamma Test., , and . ICSCA, page 403-407. ACM, (2019)Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks., , , , , , and . CoRR, (2020)Optimizing Secure Decision Tree Inference Outsourcing., , , , and . CoRR, (2021)SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases., , , , , and . CoRR, (2022)Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition., , , and . CoRR, (2022)Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization., , , , , and . CoRR, (2022)