Author of the publication

An extensible cheat-proofing multi-secret sharing scheme with low computation complexity.

, , , and . Secur. Commun. Networks, 7 (6): 1042-1048 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient target search with relevance feedback for large CBIR systems., , , and . SAC, page 1393-1397. ACM, (2006)X-InstructBLIP: A Framework for aligning X-Modal instruction-aware representations to LLMs and Emergent Cross-modal Reasoning., , , , , , , , , and . CoRR, (2023)New Results on Self-Dual Generalized Reed-Solomon Codes., , , , , and . IEEE Trans. Inf. Theory, 67 (11): 7240-7252 (2021)Keys to Better Image Inpainting: Structure and Texture Go Hand in Hand., , , and . CoRR, (2022)Robust Multihop Localization for Wireless Sensor Networks with Unreliable Beacons., , , and . Int. J. Distributed Sens. Networks, (2012)Cloud Detection Method Based on All-Sky Polarization Imaging., , , , and . Sensors, 22 (16): 6162 (2022)UFaceNet: Research on Multi-Task Face Recognition Algorithm Based on CNN., , , , and . Algorithms, 14 (9): 268 (2021)"My Curiosity was Satisfied, but not in a Good Way": Predicting User Ratings for Online Recipes., , , , , , and . SocialNLP@COLING, page 12-21. Association for Computational Linguistics and Dublin City University, (2014)DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models., , , and . CCS, page 3418-3432. ACM, (2023)Cluster Equality Validity Index and Efficient Clustering Optimization Strategy., , , and . ICIC (4), volume 14089 of Lecture Notes in Computer Science, page 213-225. Springer, (2023)