Author of the publication

Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.

, , , and . Sensors, 18 (6): 1814 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control Flow Obfuscation Using Neural Network to Fight Concolic Testing., , , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-304. Springer, (2014)Identifying Bitcoin Users Using Deep Neural Network., , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 178-192. Springer, (2018)MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks., , , , and . J. Internet Serv. Inf. Secur., 4 (1): 25-36 (2014)Password Guessing via Neural Language Modeling., , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 78-93. Springer, (2019)A Secure Architecture for Data Storage in the Cloud Environments., , , and . IMIS, page 289-291. IEEE Computer Society, (2015)Stochastic single machine scheduling with earliness and tardiness penalties and proportional weights.. ACC, page 4455-4456. IEEE, (2002)Stochastic single machine scheduling with proportional job weights to minimize deviations of completion times from a common due date.. CDC, page 5124-5127. IEEE, (2003)Reliable Password Hardening Service with Opt-Out., , and . SRDS, page 250-261. IEEE, (2022)Performance Evaluation of a Collaborative Intrusion Detection System., and . ICNC (6), page 409-413. IEEE Computer Society, (2009)A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data., , and . CIS, page 687-691. IEEE Computer Society, (2007)