Author of the publication

Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health.

, , , , , , and . NaNA, page 319-324. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Computing Environments and Methods for Power Distribution System Simulation, , , , and . CoRR, (2004)An optimal bandwidth adaptation algorithm for multi-class traffic in wireless networks., and . QSHINE, page 55. ACM, (2006)Stochastic Game-Theoretic Spectrum Access in Distributed and Dynamic Environment., , , , and . IEEE Trans. Veh. Technol., 64 (10): 4807-4820 (2015)Opportunistic Spectrum Access for CR-VANETs: A Game-Theoretic Approach., , , , , and . IEEE Trans. Veh. Technol., 63 (1): 237-251 (2014)Evaluation of IMERG Precipitation Products in the Southeast Costal Urban Region of China.. Remote. Sens., 14 (19): 4947 (2022)Opcode sequence analysis of Android malware by a convolutional neural network., , , , and . Concurr. Comput. Pract. Exp., (2020)MASTER: Multi-aspect non-local network for scene text recognition., , , , , , and . Pattern Recognit., (2021)Air-Ground Integrated Mobile Edge Networks: Architecture, Challenges, and Opportunities., , , , , , and . IEEE Commun. Mag., 56 (8): 26-32 (2018)An efficient combined deep neural network based malware detection framework in 5G environment., , , , , and . Comput. Networks, (2021)ARdetector: android ransomware detection framework., , , , and . J. Supercomput., 80 (6): 7557-7584 (April 2024)