Author of the publication

Dynamic data integrity auditing for secure outsourcing in the cloud.

, , , , , and . Concurr. Comput. Pract. Exp., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Invisible Steganography via Generative Adversarial Network., , and . CoRR, (2018)A Video Watermarking Algorithm of H.264/AVC for Content Authentication., , , , and . J. Networks, 7 (8): 1150-1154 (2012)Two statistical traffic features for certain APT group identification., , , , , , , and . J. Inf. Secur. Appl., (2022)An improved algorithm for community discovery in social networks based on label propagation., and . FSKD, page 1493-1497. IEEE, (2015)Efficiently secure multiparty computation based on homomorphic encryption., , , and . CCIS, page 343-349. IEEE, (2016)A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction., , and . Circuits Syst. Signal Process., 39 (7): 3532-3552 (2020)Linguistic Steganalysis by Enhancing and Integrating Local and Global Features., , and . IEEE Signal Process. Lett., (2023)Linguistic Steganalysis Merging Semantic and Statistical Features., , , , and . IEEE Signal Process. Lett., (2022)Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population., , , , , , and . BMC Medical Imaging, (2012)Efficient data possession-checking protocol with deduplication in cloud., , , , and . IJDSN, (2017)