Author of the publication

An efficient algorithm for fuzzy frequent itemset mining.

, , , , , and . J. Intell. Fuzzy Syst., 38 (5): 5787-5797 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique., and . Informatica, 21 (2): 247-258 (2010)A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps., , and . IEEE Access, (2018)Multilayer Dense Attention Model for Image Caption., , , , and . IEEE Access, (2019)On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags., , , and . J. Supercomput., 74 (1): 65-70 (2018)Cryptanalysis of Än Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System"., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 282-289. Springer, (2017)A Public Auditing Scheme with Data Recovery., , , , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 595-602. Springer, (2018)A New Certificate-Based Aggregate Signature Scheme for Wireless Sensor Networks., , , and . J. Inf. Hiding Multim. Signal Process., 9 (5): 1264-1280 (2018)A Parse Tree-Based NoSQL Injection Attacks Detection Mechanism., , , , and . J. Inf. Hiding Multim. Signal Process., 8 (4): 916-928 (2017)SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing., , , , and . Symmetry, 14 (7): 1393 (2022)An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks., , , , , and . IEEE Access, (2020)