Author of the publication

Secure top-k query processing via untrusted location-based service providers.

, , and . INFOCOM, page 1170-1178. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Doubly Robust Learning Framework for Debiasing Post-Click Conversion Rate Prediction., , , , , , , and . CoRR, (2022)Analysis of Human Factor in Air Traffic Control Unsafe Events Based on Improved DECIDE Model., , , and . HCI (5), volume 12185 of Lecture Notes in Computer Science, page 365-374. Springer, (2020)Optimal shape control of fluid flow using variational level set method, , and . Physics Letters A, 372 (9): 1374 - 1379 (2008)Actively Developing Joint Direction for Optimization of Graduation Design Approaches Based on Data Integration., and . CSEE (3), volume 216 of Communications in Computer and Information Science, page 41-45. Springer, (2011)Incremental Evaluation of Visible Nearest Neighbor Queries., , and . IEEE Trans. Knowl. Data Eng., 22 (5): 665-681 (2010)Efficient Human Body Configuration using MCMC., and . IEC (Prague), page 272-276. Enformatika, Çanakkale, Turkey, (2005)Stability of Solutions of Discrete Reflected BSDEs., , and . GrC, page 428-431. IEEE, (2008)Automatic seizure detection using a novel EEG feature based on nonlinear complexity., and . IJCNN, page 1686-1695. IEEE, (2016)Region based saliency detection by learning background information., , and . BMSB, page 1-6. IEEE, (2014)Design and implementation of gateway and server in an indoor high-precision positioning system., , , and . GCCE, page 540-541. IEEE, (2014)