Author of the publication

DLWoT'22: 2nd International Workshop on Deep Learning for the Web of Things.

, , , , , , and . WWW (Companion Volume), page 936-939. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks., and . IEEE Trans. Wirel. Commun., 15 (1): 357-366 (2016)Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy., and . Fundam. Informaticae, 76 (1-2): 13-23 (2007)Hiding Digital Watermarks Using Fractal Compression Technique., and . Fundam. Informaticae, 58 (2): 189-202 (2003)A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy., and . Fundam. Informaticae, 131 (2): 167-186 (2014)A Novel Index Coding Scheme for Vector Quantization., , and . Fundam. Informaticae, 71 (2-3): 215-227 (2006)A Novel Electronic English Auction System With a Secure On-Shelf Mechanism., , and . IEEE Trans. Inf. Forensics Secur., 8 (4): 657-668 (2013)Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing., , , , and . Wirel. Commun. Mob. Comput., (2018)A difference expansion oriented data hiding scheme for restoring the original host images., and . J. Syst. Softw., 79 (12): 1754-1766 (2006)Partition search filter and its performance analysis., , and . J. Syst. Softw., 47 (1): 35-43 (1999)MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining., , and . Adv. Eng. Informatics, 21 (3): 269-280 (2007)