Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traceable-then-revocable ciphertext-policy attribute-based encryption scheme., , , and . Future Gener. Comput. Syst., (2019)Joint Multiple Intent Detection and Slot Filling Via Self-Distillation., , and . ICASSP, page 7612-7616. IEEE, (2022)Flexible Attribute-Based Keyword Search via Two Access Policies., , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 815-822. Springer, (2016)A privacy-preserving personal health record with searchability and revocability using attribute-based encryption., , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 831-838. Springer, (2016)Finite element simulation of stress relaxation process in living cells., , , and . NEMS, page 67-71. IEEE, (2015)A Survey of Large Language Models in Medicine: Progress, Application, and Challenge., , , , , , , , , and 2 other author(s). CoRR, (2023)Shifted Autoencoders for Point Annotation Restoration in Object Counting., , , , , and . ECCV (25), volume 15083 of Lecture Notes in Computer Science, page 113-130. Springer, (2024)Low-supervision urgency detection and transfer in short crisis messages., and . ASONAM, page 353-356. ACM, (2019)Decoupled Side Information Fusion for Sequential Recommendation., , and . SIGIR, page 1611-1621. ACM, (2022)Exploring Recommendation Capabilities of GPT-4V(ision): A Preliminary Case Study., , , , , , , , and . CoRR, (2023)