Author of the publication

Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment.

, , , , and . DSC, page 84-91. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Boolean matching based on NPN classification., , , and . FPT, page 310-313. IEEE, (2013)Attention-Based Text Recognition in Image., , , , , and . DSC, page 278-283. IEEE, (2019)Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network., , , , , and . DSC, page 306-311. IEEE, (2019)Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-Gram., , , , , and . DSC, page 300-305. IEEE, (2019)Chinese Internet Addiction Inventory: Developing a Measure of Problematic Internet Use for Chinese College Students., , , , and . Cyberpsy., Behavior, and Soc. Networking, 10 (6): 805-812 (2007)Decentralized Control of Uncertain Systems Via Adaptive Sliding and Overlapping Decomposition., and . ROCOND, page 784-789. International Federation of Automatic Control, (2012)A Comparative Study on Inter-Device Interaction: One-Handed Interaction VS Two-Handed Interaction., , and . VINCI, page 67-74. ACM, (2016)Relational IT Governance, Its Antecedents and Outcomes: A Study on Chinese Firms., , , and . ICIS, Association for Information Systems, (2016)Searching for Capacity Factors is NP-Complete., , , and . ICC, page 1431-1435. IEEE, (2008)Fused Text Segmentation Networks for Multi-oriented Scene Text Detection., , , and . CoRR, (2017)