Author of the publication

Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data.

, , , , , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Bandwidth Variation Pattern Differentiation for HTTP Adaptive Streaming over 4G Cellular Networks., , , and . IPCCC, page 1-9. IEEE, (2018)QShield: Protecting Outsourced Cloud Data Queries With Multi-User Access Control Based on SGX., , , and . IEEE Trans. Parallel Distributed Syst., 32 (2): 485-499 (2021)Improving generalization ability of instance transfer-based imbalanced sentiment classification of turn-level interactive Chinese texts., , , , , and . Serv. Oriented Comput. Appl., 13 (2): 155-167 (2019)BIC: Twitter Bot Detection with Text-Graph Interaction and Semantic Consistency., , , , , , and . CoRR, (2022)A Study of Learner-Oriented Negative Emotion Compensation in E-learning., , and . J. Educ. Technol. Soc., 17 (4): 420-431 (2014)Game Theoretical Secure Caching Scheme in Multihoming Edge Computing-Enabled Heterogeneous Networks., , , , , and . IEEE Internet Things J., 6 (3): 4536-4546 (2019)Aspect-Based Sentiment Analysis With Heterogeneous Graph Neural Network., , , and . IEEE Trans. Comput. Soc. Syst., 10 (1): 403-412 (February 2023)Avoiding Optimal Mean ℓ2, 1-Norm Maximization-Based Robust PCA for Reconstruction., , , , , and . Neural Comput., 29 (4): 1124-1150 (2017)A Boundary Regressing Model for Nested Named Entity Recognition., , , , , , and . CoRR, (2020)Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data., , , , , , , and . CoRR, (2019)