Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Outsourced Calculation on Floating Point Numbers., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (11): 2513-2527 (2016)Federated Learning based on Defending Against Data Poisoning Attacks in IoT., , , , and . CoRR, (2022)Privacy-preserving association rule mining via multi-key fully homomorphic encryption., , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (2): 641-650 (February 2023)Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things., , , , and . IEEE Trans. Veh. Technol., 69 (8): 8820-8831 (2020)Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data., , , , , , and . IEEE Internet Things J., 6 (6): 9841-9852 (2019)CrowdFL: Privacy-Preserving Mobile Crowdsensing System Via Federated Learning., , , and . IEEE Trans. Mob. Comput., 22 (8): 4607-4619 (August 2023)A Reliable and Secure Mobile Cyber-Physical Digital Microfluidic Biochip for Intelligent Healthcare., , , , , , and . IEEE Access, (2023)Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks., , , , and . IEEE Trans. Serv. Comput., 16 (3): 2114-2125 (May 2023)PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud., , , , , and . KSII Trans. Internet Inf. Syst., 8 (1): 282-304 (2014)Further results on several classes of optimal ternary cyclic codes with minimum distance four., , , and . IACR Cryptol. ePrint Arch., (2023)