Author of the publication

Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection.

, , , , , and . Secur. Commun. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly detection for big log data using a Hadoop ecosystem., , and . BigComp, page 377-380. IEEE, (2017)Linear Detrending Subsequence Matching in Time-Series Databases, , and . CoRR, (2010)Assessing the trustworthiness of location data based on provenance., , , and . GIS, page 276-285. ACM, (2009)Provenance-based trustworthiness assessment in sensor networks., , and . DMSN, page 2-7. ACM, (2010)Performance Analysis of Hadoop-Based SQL and NoSQL for Processing Log Data., , , and . DASFAA Workshops, volume 9052 of Lecture Notes in Computer Science, page 293-299. Springer, (2015)An Efficient Algorithm for Computing Range-Groupby Queries., , , , and . DASFAA, volume 3882 of Lecture Notes in Computer Science, page 483-497. Springer, (2006)Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection., , , , , and . Secur. Commun. Networks, (2017)Envelope-based boundary image matching for smart devices under arbitrary rotations., , , and . Multim. Syst., 21 (1): 29-47 (2015)Experimental Comparison of Machine Learning Models in Malware Packing Detection., , , and . APNOMS, page 377-380. IEEE, (2020)Efficient moving average transform-based subsequence matching algorithms in time-series databases., and . Inf. Sci., 177 (23): 5415-5431 (2007)