Author of the publication

Enabling secure and effective near-duplicate detection over encrypted in-network storage.

, , , and . INFOCOM, page 1-9. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RRXF: Redundancy reducing XML storage in relations., , , and . VLDB, page 189-200. Morgan Kaufmann, (2003)Crimson: A Data Management System to Support Evaluating Phylogenetic Tree Reconstruction Algorithms., , , , , and . VLDB, page 1231-1234. ACM, (2006)An Improved Over-sampling Algorithm based on iForest and SMOTE., , and . ICSCA, page 75-80. ACM, (2019)Reservoir Parameter Prediction Using Optimized Seismic Attributes Based on Gamma Test., , and . ICSCA, page 403-407. ACM, (2019)Towards Secure and Accurate Targeted Mobile Coupon Delivery., , , , , , and . IEEE Access, (2016)SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases., , , , , and . CoRR, (2022)Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN., , , , , , and . DSN, page 63-74. IEEE, (2021)Privacy-Preserving Collaborative Analytics on Medical Time Series Data., , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1687-1702 (2022)Efficiently Supporting Structure Queries on Phylogenetic Trees., , and . SSDBM, page 93-102. (2005)inline-graphic not available: see fulltext : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service., , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 519-541. Springer, (2021)