Author of the publication

An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning.

, , , , , , and . WWW, page 732-742. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination., , , and . IEEE Trans. Vehicular Technology, 68 (2): 1877-1887 (2019)A sybil attack detection scheme for privacy-preserving mobile social networks., and . ICICS, page 1-5. IEEE, (2015)Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT., and . GLOBECOM, page 1-6. IEEE, (2017)A Reliable and Energy-Efficient Opportunistic Routing Protocol for Dense Lossy Networks., , , and . IEEE Wirel. Commun. Lett., 6 (1): 26-29 (2017)Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat., , , , and . Future Gener. Comput. Syst., (2018)SFPM: A Secure and Fine-Grained Privacy-Preserving Matching Protocol for Mobile Social Networking., , , and . Big Data Res., (2016)Designing efficient proxy signature schemes for mobile communication., , and . Sci. China Ser. F Inf. Sci., 51 (2): 183-195 (2008)Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers., , , , and . IEEE Trans. Dependable Secur. Comput., 15 (1): 27-39 (2018)Defending Against False Data Injection Attacks on Power System State Estimation., , and . IEEE Trans. Ind. Informatics, 13 (1): 198-207 (2017)Guest Editorial Special Issue on Recent Advances of Security, Privacy, and Trust in Mobile Crowdsourcing., , , and . IEEE Internet Things J., 11 (2): 1784-1787 (January 2024)