Author of the publication

Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT.

, , , , , and . IEEE Internet Things J., 11 (7): 11353-11367 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performability analysis of multi-state sliding window systems., , , and . Reliab. Eng. Syst. Saf., (2020)Research on Reliable Transport Technology of Tubular Distribution Mobile Wireless Sensor Network., , , , , and . NCM, page 1153-1156. IEEE Computer Society, (2009)A remote data disaster recovery system model based on Undo., , , , and . NCM, page 123-128. IEEE Computer Society, (2010)Extraction of Relationship Between Esophageal Cancer and Biomolecules Based on BioBERT., , , , , , and . ICIC (3), volume 14088 of Lecture Notes in Computer Science, page 106-118. Springer, (2023)A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS., , , , , , , , , and . J. Signal Process. Syst., 96 (3): 215-237 (March 2024)Sparse-to-dense coarse-to-fine depth estimation for colonoscopy., , , , , , , , , and 1 other author(s). Comput. Biol. Medicine, (June 2023)An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography., , , , and . IEEE Access, (2019)An Entity Alignment Model for Echinococcosis Knowledge Graph., , , , and . ICIC (LNAI 6), volume 14880 of Lecture Notes in Computer Science, page 62-74. Springer, (2024)Research on Covert Communication Technology Based on Matrix Decomposition of Digital Currency Transaction Amount., , , , , , , , , and 1 other author(s). KSII Trans. Internet Inf. Syst., 18 (4): 1020-1041 (2024)A covert channel over blockchain based on label tree without long waiting times., , , , , , , , and . Comput. Networks, (August 2023)