Author of the publication

A Keyword-Grouping Inverted Index Based Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.

, , , , , and . IEEE Trans. Sustain. Comput., 7 (3): 561-578 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection., , , , , and . IEEE Trans. Fuzzy Syst., 28 (7): 1329-1343 (2020)A matrix-based cross-layer key establishment protocol for smart homes., , , , and . Inf. Sci., (2018)Security and privacy in big data., , and . Concurr. Comput. Pract. Exp., 28 (10): 2856-2857 (2016)PICO: Pipeline Inference Framework for Versatile CNNs on Diverse Mobile Devices., , , , , , and . IEEE Trans. Mob. Comput., 23 (4): 2712-2730 (April 2024)Use of GAN to Help Networks to Detect Urban Change Accurately., , , and . Remote. Sens., 14 (21): 5448 (2022)Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list., , , and . Decis. Support Syst., 41 (1): 69-83 (2005)Cyber Code Intelligence for Android Malware Detection., , , , , , and . IEEE Trans. Cybern., 53 (1): 617-627 (2023)Robust image retrieval with hidden classes., , , and . Comput. Vis. Image Underst., 117 (6): 670-679 (2013)Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges., , , and . IEEE Internet Things J., 6 (2): 2159-2187 (2019)Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries., , , , , and . IEEE Trans. Netw. Sci. Eng., 9 (3): 970-979 (2022)