Author of the publication

Secure and Efficient Certificateless Provable Data Possession for Cloud-Based Data Management Systems.

, , , , and . DASFAA (1), volume 12681 of Lecture Notes in Computer Science, page 71-87. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive neural control design for a class of perturbed nonlinear time-varying delay and input delay systems., , , and . ICMLC, page 1168-1173. IEEE, (2011)Non-Destructive Damage Detection of Spacecraft Thermal Protection System with ISAR Imaging., , , and . IGARSS, page 3386-3388. IEEE, (2022)A class of Cantor sets associated with the regular continued fractions., , and . Comput. Math. Appl., 61 (8): 2251-2255 (2011)Leaf Clustering Based on Sparse Subspace Clustering., , , , and . ICIC (2), volume 9772 of Lecture Notes in Computer Science, page 55-66. Springer, (2016)Similarity Matrix Construction Methods in Sparse Subspace Clustering Algorithm for Hyperspectral Imagery Clustering., , , , and . ICIC (1), volume 10361 of Lecture Notes in Computer Science, page 695-700. Springer, (2017)Limn Matrix: A Tool for Visualizing Large, Distributed, High-Dimension Data Sets., , and . CAINE, page 263-268. ISCA, (2005)Moving visual focus in salient object segmentation., , , , , and . IET Image Processing, 9 (9): 758-769 (2015)Graph-Based image segmentation with bag-of-pixels., , , , and . ICMLC, page 1548-1551. IEEE, (2013)A new no-reference quality metric for JPEG2000 images., and . IEEE Trans. Consumer Electronics, 56 (2): 743-750 (2010)A Latency-Hiding Scheme for Adjacent Interaction Simulation on Multi-core/Many-Core Clusters., , , , and . AsiaSim, volume 402 of Communications in Computer and Information Science, page 13-24. Springer, (2013)