Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud., , and . SCC@AsiaCCS, page 27-33. ACM, (2017)Location Privacy-Preserving Truth Discovery in Mobile Crowd Sensing., , , and . ICCCN, page 1-9. IEEE, (2020)Reliable and Privacy-Preserving Task Matching in Blockchain-Based Crowdsourcing., , , , , and . CIKM, page 1879-1888. ACM, (2021)On Algebraic Property of T-Functions., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 267-269 (2012)EVS2vec: A Low-dimensional Embedding Method for Encrypted Video Stream Analysis., , , , and . SECON, page 537-545. IEEE, (2023)Markov Probability Fingerprints: A Method for Identifying Encrypted Video Traffic., , , and . MSN, page 283-290. IEEE, (2020)Privacy-Preserving Swarm Learning Based on Homomorphic Encryption., , , , and . ICA3PP (3), volume 13157 of Lecture Notes in Computer Science, page 509-523. Springer, (2021)Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic., , , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1126-1134. IEEE, (2021)Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations., , , , and . ICC, page 1-6. IEEE, (2016)PDCS: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing., , , and . DASFAA (1), volume 11446 of Lecture Notes in Computer Science, page 227-243. Springer, (2019)