Author of the publication

Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data.

, , , , , and . IEEE Trans. Cloud Comput., 11 (4): 3452-3468 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privacy-Preserving Anomaly Detection and Localization in Bitstream Video., , and . IEEE Trans. Circuits Syst. Video Technol., 30 (9): 3268-3281 (2020)Keyword Spotting in the Homomorphic Encrypted Domain Using Deep Complex-Valued CNN., , , and . ACM Multimedia, page 1474-1483. ACM, (2022)Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain., , and . TrustCom/BigDataSE, page 389-396. IEEE, (2019)An efficient image homomorphic encryption scheme with small ciphertext expansion., and . ACM Multimedia, page 803-812. ACM, (2013)A Robust Watermarking Scheme for Encrypted JPEG Bitstreams with Format-Compliant Encryption., , and . TrustCom/BigDataSE, page 397-403. IEEE, (2019)Privacy-Preserving Hough Transform and Line Detection on Encrypted Cloud Images., , , , , and . TrustCom, page 486-493. IEEE, (2021)Secure Homomorphic Evaluation of Discrete Cosine Transform with High Precision., , , , , and . TrustCom, page 266-272. IEEE, (2021)Automatic Asymmetric Embedding Cost Learning via Generative Adversarial Networks., , , and . ACM Multimedia, page 8316-8326. ACM, (2023)FedMCT: A Federated Framework for Intellectual Property Protection and Malicious Client Tracking., , , , and . ICMLC, page 80-86. ACM, (2024)A New Adversarial Embedding Method for Enhancing Image Steganography., , , and . IEEE Trans. Inf. Forensics Secur., (2021)