Author of the publication

Experimental Validation of Encrypted Quadratic Optimization Implemented on Raspberry Pi.

, , and . ASCC, page 2018-2023. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Attack and Defense Views of Rational Delegation of Computation., , , and . IEEE Access, (2019)Rational Delegation Computing Using Information Theory and Game Theory Approach., and . MMM (2), volume 11962 of Lecture Notes in Computer Science, page 669-680. Springer, (2020)A hybrid encryption scheme based on the satisfiability problem., , and . GlobalSIP, page 1363-1367. IEEE, (2017)Experimental Validation of Encrypted Quadratic Optimization Implemented on Raspberry Pi., , and . ASCC, page 2018-2023. IEEE, (2022)Outsourced and Practical Privacy-Preserving K-Prototype Clustering supporting Mixed Data., , , , and . ICC, page 5645-5650. IEEE, (2022)Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users., , , , , and . CollaborateCom (1), volume 349 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 493-510. Springer, (2020)Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles., , , and . NaNA, page 82-89. IEEE, (2022)Resisting Membership Inference Attacks by Dynamically Adjusting Loss Targets., , and . NaNA, page 574-579. IEEE, (2023)An Efficient Blockchain-Based Certificateless Anonymous Authentication Scheme for VANETs., , , , and . NaNA, page 649-654. IEEE, (2023)A coding computation scheme for secure aggregation., and . J. King Saud Univ. Comput. Inf. Sci., 36 (5): 102073 (2024)