Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

System and Protocols for secure Intercloud Communications., , , , , , and . ICITST, page 399-404. IEEE, (2016)A 4C Model for Hyflex Classrooms., , , and . COMPSAC, page 145-150. IEEE, (2022)Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage., , and . Comput. J., 61 (12): 1806-1824 (2018)Modified correlated total variation regularization for low-rank matrix recovery., , and . Signal Image Video Process., 18 (10): 6807-6819 (September 2024)Access Pattern Hidden Query over Encrypted Data through Multi-Clouds., and . GLOBECOM, page 1-6. IEEE, (2017)Secure Query in Wireless Sensor Network Using Underground Parties., , , , and . J. Networks, 7 (12): 2063-2069 (2012)FAQ: A Fuzzy-Logic-Assisted Q-Learning Model for Resource Allocation in 6G V2X., , , , and . IEEE Internet Things J., 11 (2): 2472-2489 (January 2024)A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud., , and . IEEE Trans. Parallel Distributed Syst., 30 (6): 1208-1221 (2019)Defining Requirements on Technology Systems Assessment from Life Cycle Perspectives: Cases on Recycling of Photovoltaic and Secondary Batteries., , , , , , and . Int. J. Autom. Technol., 14 (6): 890-908 (2020)GSum: A General Framework for Guided Neural Abstractive Summarization., , , , and . NAACL-HLT, page 4830-4842. Association for Computational Linguistics, (2021)