Author of the publication

Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing.

, , , , , and . IEEE Internet Things J., 9 (8): 6184-6198 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilization-based pricing for power management and profit optimization in data centers., and . J. Parallel Distributed Comput., 72 (1): 27-34 (2012)Training Radial Basis Function Networks with Particle Swarms., , , and . ISNN (1), volume 3173 of Lecture Notes in Computer Science, page 317-322. Springer, (2004)Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data., , , , and . IEEE Trans. Cloud Comput., 9 (1): 27-39 (2021)Traffic Flow Video Image Recognition and Analysis Based on Multi-Target Tracking Algorithm and Deep Learning., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (8): 8762-8775 (August 2023)Hashtag our stories: Hashtag recommendation for micro-videos via harnessing multiple modalities., , , , and . Knowl. Based Syst., (2020)A spatiotemporal dynamic analyses approach for dockless bike-share system., , , and . Comput. Environ. Urban Syst., (2021)Multi-Prompts Learning with Cross-Modal Alignment for Attribute-Based Person Re-identification., , , , , and . AAAI, page 6979-6987. AAAI Press, (2024)Evaluating the Covid-19 Screening Regime for Cross-Border Workers., , , , , , , , and . WSC, page 605-616. IEEE, (2022)Maritime Disruption Impact Evaluation Using Simulation and Big Data Analytics., , , , , , , and . WSC, page 784-795. IEEE, (2022)Finding bugs in Gremlin-based graph database systems via Randomized differential testing., , , , , , , , and . ISSTA, page 302-313. ACM, (2022)