Author of the publication

Privacy-Preserving Top-k Spatial Keyword Queries over Outsourced Database.

, , , , and . DASFAA (1), volume 9049 of Lecture Notes in Computer Science, page 589-608. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Resource Allocation with Threshold in OFDMA-based Relay Networks., , , and . VTC Spring, page 1-5. IEEE, (2010)Hyperspectral image classification using One Dimensional Manifold Embedding with Spectral-Spatial based affinity metric., , , , , , and . CYBCONF, page 394-398. IEEE, (2015)A Tag-Based Integrated Diffusion Model for Personalized Location Recommendation., , , , and . ICONIP (5), volume 10638 of Lecture Notes in Computer Science, page 327-337. Springer, (2017)Sparse Coding From a Bayesian Perspective., , and . IEEE Trans. Neural Networks Learn. Syst., 24 (6): 929-939 (2013)Block sparse representation for pattern classification: Theory, extensions and applications., , , and . Pattern Recognit., (2019)cPSO-CNN: An efficient PSO-based algorithm for fine-tuning hyper-parameters of convolutional neural networks., , and . Swarm Evol. Comput., (2019)一种基于椭圆曲线的轻量级身份认证及密钥协商方案 (Elliptic Curve Based Light-weight Authentication and Key Agreement Scheme)., , and . 计算机科学, 42 (1): 137-141 (2015)Graph-Regularized Low-Rank Representation for Destriping of Hyperspectral Images., , and . IEEE Trans. Geosci. Remote. Sens., 51 (7-1): 4009-4018 (2013)Feature-opinion pair identification method in two-stage based on dependency constraints., , , , and . Int. J. Inf. Commun. Technol., 13 (4): 454-469 (2018)Detecting Anomalous Trajectories Using the Dempster-Shafer Evidence Theory Considering Trajectory Features from Taxi GNSS Data., , and . Information, 9 (10): 258 (2018)