Author of the publication

Guest Editorial: Special Section on Emerging Privacy and Security Issues Brought by Artificial Intelligence in Industrial Informatics.

, , , , and . IEEE Trans. Ind. Informatics, 16 (3): 2029-2030 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction., , , and . ICASSP, page 2690-2694. IEEE, (2021)An efficient blind filter: Location privacy protection and the access control in FinTech., , , , , and . Future Gener. Comput. Syst., (2019)FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 5130-5142 (November 2023)DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity., , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 611-626. (2017)A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes., , , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 222-236. (2017)Edit Distance Based Encryption and Its Application., , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 103-119. Springer, (2016)DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay., , , , , , and . ESORICS (2), volume 13555 of Lecture Notes in Computer Science, page 86-104. Springer, (2022)A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security., , , and . INCoS, page 552-559. IEEE, (2013)RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security., , , and . ProvSec, volume 8782 of Lecture Notes in Computer Science, page 194-205. Springer, (2014)Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership., , , , , and . J. Syst. Softw., (2022)