Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of neural network in map annotation recognition., and . CAIBDA, page 1-4. VDE / IEEE, (2022)Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain., , , , and . ICC, page 1-6. IEEE, (2019)Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption., , , , and . CoRR, (2022)Hercules: Boosting the Performance of Privacy-preserving Federated Learning., , , , , , and . CoRR, (2022)Impact of Slopes on ICESat-2 Elevation Accuracy Along the CHINARE Route in East Antarctica., , , , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2022)Stand-in Backdoor: A Stealthy and Powerful Backdoor Attack., , and . GLOBECOM, page 1-6. IEEE, (2021)A Multi-objective Cuckoo search Algorithm Based on Decomposition., , , , , and . ICACI, page 229-233. IEEE, (2019)Prediction Model of Lake Water Volume Based on K-Means., , , , and . ICECC, page 57-62. ACM, (2022)基于启发式规则的自动化本体扩充 (Automatic Ontology Population Based on Heuristic Rules)., , , and . 计算机科学, 43 (3): 213-219 (2016)Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)