Author of the publication

Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection.

, , , , , and . Secur. Commun. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection., , , , , and . Secur. Commun. Networks, (2017)SaLoBa: Maximizing Data Locality and Workload Balance for Fast Sequence Alignment on GPUs., , , , , , , and . CoRR, (2023)Design and implementation of a load shedding engine for solving starvation problems in Apache Kafka., , , , and . NOMS, page 1-4. IEEE, (2018)SALoBa: Maximizing Data Locality and Workload Balance for Fast Sequence Alignment on GPUs., , , , , , , and . IPDPS, page 728-738. IEEE, (2022)Message Latency-Based Load Shedding Mechanism in Apache Kafka., , , , , and . Euro-Par Workshops, volume 11997 of Lecture Notes in Computer Science, page 731-736. Springer, (2019)AGAThA: Fast and Efficient GPU Acceleration of Guided Sequence Alignment for Long Read Mapping., , , , , and . PPoPP, page 431-444. ACM, (2024)All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis., , , , and . Secur. Commun. Networks, (2019)Variable size sampling to support high uniformity confidence in sensor data streams., , , and . IJDSN, (2018)A time-series matching approach for symmetric-invariant boundary image matching., , , and . Multimedia Tools Appl., 77 (16): 20979-21001 (2018)Rapid Common Hardware-in-the-loop Development., and . HSC, page 114-124. The Society for Modeling and Simulation International (SCS), (2009)