Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Privacy Quantification and De-identification Model Based on Information Theory., , and . NaNA, page 213-222. IEEE, (2019)A risk adaptive access control model based on Markov for big data in the cloud., , , and . IJHPCN, 13 (4): 464-475 (2019)Structural Mutual Information and Its Application., , , and . IACR Cryptol. ePrint Arch., (2021)Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices., , , , , and . J. Netw. Comput. Appl., (2020)Hierarchical Consistency and Refinement for Semi-supervised Medical Segmentation., , , and . ICPR Workshops (6), volume 12666 of Lecture Notes in Computer Science, page 267-276. Springer, (2020)Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators., , , , and . INFOCOM Workshops, page 62-67. IEEE, (2020)Secret Sharing Scheme with Fairness., , , and . TrustCom, page 494-500. IEEE Computer Society, (2011)Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing., , , , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 311-321. (2016)DFedXGB: An XGB Vertical Federated Learning Framework with Data Desensitization., , and . TrustCom, page 157-164. IEEE, (2023)RVFL: Rational Verifiable Federated Learning Secure Aggregation Protocol., , , , and . IEEE Internet Things J., 11 (14): 25147-25161 (July 2024)