Author of the publication

SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud.

, , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications., , , , , and . IEEE Internet Things J., 5 (4): 2947-2957 (2018)Efficient and Privacy-Preserving Fusion Based Multi-Biometric Recognition., , , , , and . GLOBECOM, page 4860-4865. IEEE, (2022)Efficient and Privacy-Preserving Geo-Social-Based POI Recommendation Over Encrypted Data., , , , , and . ICC, page 1603-1608. IEEE, (2023)Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks., , , , , and . Peer Peer Netw. Appl., 17 (4): 2523-2537 (July 2024)FDKeeper: A Quick and Open Failure Detector for Cloud Computing System., , , and . C3S2E, page 14:1-14:8. ACM, (2014)SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1492-1504 (2022)Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services., , , , , , and . IEEE Trans. Veh. Technol., 67 (11): 11084-11097 (2018)Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm., , , , , and . ICC, page 1-6. IEEE, (2019)PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 1831-1844 (July 2024)