From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT., , , , и . Inf. Sci., (2020)WMDefense: Using Watermark to Defense Byzantine Attacks in Federated Learning., , и . INFOCOM Workshops, стр. 1-6. IEEE, (2022)Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud., , , , и . ICC, стр. 1-6. IEEE, (2020)Privacy-preserving public auditing for non-manager group., , и . ICC, стр. 1-6. IEEE, (2017)Quantization Backdoors to Deep Learning Commercial Frameworks., , , , , , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (3): 1155-1172 (мая 2024)SeShare: Secure cloud data sharing based on blockchain and public auditing., , , , и . Concurr. Comput. Pract. Exp., (2019)Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects., , , , , , и . CoRR, (2024)IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systems., , , и . ICC, стр. 1-6. IEEE, (2017)EKMP: An enhanced key management protocol for IEEE 802.16m., , , и . WCNC, стр. 1137-1142. IEEE, (2011)Privacy Preserving Fog-Enabled Dynamic Data Aggregation in Mobile Phone Sensing., , , , , и . GLOBECOM, стр. 1-6. IEEE, (2019)