Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Role-Based Access Control on E-Health Records., , , and . AsiaCCS, page 559-570. ACM, (2016)Fast Settlement Scheme of Aviation Business Privacy Preservation Based on Consortium Blockchain., , and . ISPA/BDCloud/SocialCom/SustainCom, page 1460-1468. IEEE, (2021)Power Allocation of Superimposed Pilots for URLLC With Short-Packet Transmission in IIoT., , , , and . IEEE Wirel. Commun. Lett., 11 (11): 2365-2369 (2022)Range Scaling Global U-Net for Perceptual Image Enhancement on Mobile Devices., , , , , , , and . ECCV Workshops (5), volume 11133 of Lecture Notes in Computer Science, page 230-242. Springer, (2018)Perceptual Quality Assessment of Internet Videos., , , , , and . ACM Multimedia, page 1248-1257. ACM, (2021)A supervised privacy preservation transaction system for aviation business., , and . Peer Peer Netw. Appl., 17 (4): 1898-1913 (July 2024)Generalized Superimposed Pilot Enabled URLLC in the Finite Blocklength Regime., , , , and . GLOBECOM (Workshops), page 1499-1504. IEEE, (2023)Privacy Preservation for Outsourced Medical Data With Flexible Access Control., , , and . IEEE Access, (2018)NTIRE 2019 Challenge on Image Enhancement: Methods and Results., , , , , , , , , and 43 other author(s). CVPR Workshops, page 2224-2232. Computer Vision Foundation / IEEE, (2019)Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage., , , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 411-426. Springer, (2017)