Author of the publication

Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks.

, , , , , and . IEEE Netw., 36 (5): 173-179 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mixture-State Document Segmentation Using Wavelet-Domain Hidden Markov Tree Models., , , and . WAA, volume 2251 of Lecture Notes in Computer Science, page 230-236. Springer, (2001)Fuzzy Morphology Based Feature Identification in Image Processing.. ACFIE, volume 78 of Advances in Intelligent and Soft Computing, page 607-615. (2010)Study on image feature recognition algorithm and its application in public security management., , and . Int. J. Inf. Technol. Manag., 18 (2/3): 284-296 (2019)Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things., , , , , and . IEEE Internet Things J., 9 (4): 2468-2484 (2022)A lightweight delegated private set intersection cardinality protocol., , , and . Comput. Stand. Interfaces, (January 2024)Poster: Emotion-Aware Smart Tips for Healthy and Happy Sleep., , , , , , , , and . MobiCom, page 549-551. ACM, (2017)Background reconstruction from multiple images. (Reconstruction d'une scène masquée à partir de multi-image).. University of Paris-Saclay, France, (2018)Dynamic Channel Modeling for an Indoor Scenario at 23.5 GHz., , , , , , and . IEEE Access, (2015)A Fast Algorithm for Occlusion Detection and Removal., , , and . ICIP, page 2905-2909. IEEE, (2018)CCA-Secure Deterministic Identity-Based Encryption Scheme., , , , , and . J. Univers. Comput. Sci., 25 (3): 245-269 (2019)