Author of the publication

Adaptive Differential Privacy of Character and Its Application for Genome Data Sharing.

, , , , , and . NaNA, page 429-436. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A risk adaptive access control model based on Markov for big data in the cloud., , , and . IJHPCN, 13 (4): 464-475 (2019)Secret Sharing Scheme with Fairness., , , and . TrustCom, page 494-500. IEEE Computer Society, (2011)A reversible and lossless secret image sharing scheme with authentication for color images., , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101854 (December 2023)Res2-Unet: An Enhanced Network for Generalized Nuclear Segmentation in Pathological Images., , , , and . MMM (2), volume 12573 of Lecture Notes in Computer Science, page 87-98. Springer, (2021)Rational Delegation Learning Outsourcing Scheme Based on Game Theory., , , , and . NaNA, page 130-135. IEEE, (2020)Adaptive Differential Privacy of Character and Its Application for Genome Data Sharing., , , , , and . NaNA, page 429-436. IEEE, (2019)一种理性安全协议的博弈逻辑描述模型 (Game Logic Formal Model of Rational Secure Protocol)., , , and . 计算机科学, 42 (9): 118-126 (2015)Blockchain Privacy Disclosure Risk Assessment Scheme Based on Improved Paillier Algorithm., , , , and . HPCC/DSS/SmartCity/DependSys, page 1881-1887. IEEE, (2022)Fine-Grained Access Control Proxy Re-encryption with HRA Security from Lattice., , , , , and . GPC (2), volume 14504 of Lecture Notes in Computer Science, page 175-190. Springer, (2023)Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy., , , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 446-458. Springer, (2017)