Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving and Collusion Resistant Energy Sharing., , , and . ICASSP, page 6941-6945. IEEE, (2018)Privacy preserving divisible double auction with a hybridized TEE-blockchain system., , , , and . Cybersecur., 4 (1): 37 (2021)A Novel Algorithm for Finding Overlapping Communities in Networks Based on Label Propagation., , , and . ICSI (2), volume 9141 of Lecture Notes in Computer Science, page 325-332. Springer, (2015)Poster: Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain System., , , and . ICDCS, page 1144-1145. IEEE, (2021)Uncertain Data Stream Classification with Concept Drift., , , and . CBD, page 265-271. IEEE Computer Society, (2016)Poster: Cryptographic Inferences for Video Deep Neural Networks., , , , , and . CCS, page 3395-3397. ACM, (2022)LogBug: Generating Adversarial System Logs in Real Time., , and . CIKM, page 2229-2232. ACM, (2020)基于引力因子的加权网络重叠社区识别算法 (Overlapping Community Recognition Algorithm of Weighted Networks Based on Gravity Factor)., , , and . 计算机科学, 43 (12): 153-157 (2016)Privacy-Preserving Cloud-Based DNN Inference., , and . ICASSP, page 2675-2679. IEEE, (2021)Multi-view Correlation based Black-box Adversarial Attack for 3D Object Detection., , , , and . KDD, page 1036-1044. ACM, (2021)