Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space., , , , , , , , and . CoRR, (2020)Secure Updatable Storage Access Control System for EHRs in the Cloud., , , , , and . IEEE Trans. Serv. Comput., 16 (4): 2939-2953 (July 2023)New Secure Sparse Inner Product with Applications to Machine Learning., , , , , , and . CoRR, (2022)Fluent: Round-efficient Secure Aggregation for Private Federated Learning., , , , , and . CoRR, (2024)VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder., , , , , , , and . CoRR, (2022)Offline/Online lattice-based ciphertext policy attribute-based encryption., , , , , and . J. Syst. Archit., (2022)Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search., , , and . Comput. J., 66 (9): 2265-2278 (September 2023)Dual Access Control for Cloud-Based Data Storage and Sharing., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1036-1048 (2022)Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity., , , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 4101-4117 (September 2023)ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain., , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 4536-4550 (November 2023)