Author of the publication

Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing.

, , , , , and . TrustCom, page 547-556. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient relational algebra algorithms and data structures for gpu, , , and . 12-01. Georgia Institute of Technology, (2012)Taylor series and adaptive directional selection for real time demosaicking., , , and . Displays, (2016)Probabilistic Latent Semantic Analysis for Multichannel Biomedical Signal Clustering., and . IEEE Signal Process. Lett., 23 (12): 1821-1824 (2016)A knowledge-based controller with fuzzy reasoning used in process control., , and . Int. J. Systems Science, 28 (6): 579-585 (1997)CRL/Brandeis: description of the Diderot system as used for MUC-5., , , , , , and . MUC, page 161-179. ACL, (1993)Mobile-Sink Routing Algorithm Based on Energy and Distance for Wireless Sensor Networks., , , , and . GreenCom/iThings/CPScom, page 951-956. IEEE, (2013)Moving Least-Squares Method for Interlaced to Progressive Scanning Format Conversion., , and . IEEE Trans. Circuits Syst. Video Techn., 23 (11): 1865-1872 (2013)Deinterlacing Using Taylor Series Expansion and Polynomial Regression., , and . IEEE Trans. Circuits Syst. Video Techn., 23 (5): 912-917 (2013)Using Focusing Search Algorithms and a Strong Heuristic to Solve the Findpath Problem in Robotics., , and . ACM Conference on Computer Science, page 63-69. ACM, (1990)Human + agent: creating recombinant information., , , , and . ACM Multimedia, page 454-455. ACM, (2003)