Author of the publication

Practical and privacy-assured data indexes for outsourced cloud data.

, , , , and . GLOBECOM, page 671-676. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Low-latency Secure Data Outsourcing Scheme for Cloud-WSN., , , , and . CoRR, (2018)An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing., , , , and . ICC, page 1-6. IEEE, (2017)Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling., , , and . DSN, page 411-423. IEEE, (2020)Load balance and energy efficient data gathering in wireless sensor networks., , , and . Wirel. Commun. Mob. Comput., 8 (5): 645-659 (2008)Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters., , , and . Secur. Commun. Networks, (2017)HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding., , , , , and . DSN, page 530-542. IEEE, (2019)CLPP: Context-aware location privacy protection for location-based social network., , , , and . ICC, page 1164-1169. IEEE, (2015)A novel stochastic-encryption-based P2P Digital Rights Management scheme., , , and . ICC, page 5541-5545. IEEE, (2015)CAMA: Class activation mapping disruptive attack for deep neural networks., , , , and . Neurocomputing, (2022)PPLS: a privacy-preserving location-sharing scheme in mobile online social networks., , , , , , and . Sci. China Inf. Sci., (2020)