Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards General Purpose Acceleration by Exploiting Common Data-Dependence Forms., , , and . MICRO, page 924-939. ACM, (2019)Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing., , , , , and . IEEE Trans. Serv. Comput., 12 (5): 772-785 (2019)PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data., , , , , , and . IEEE Trans. Cloud Comput., 11 (3): 2379-2391 (July 2023)A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network., , , , , and . IEEE Trans. Cloud Comput., 11 (4): 3381-3395 (October 2023)A new combinatorial model for deterministic competing failure analysis., , and . Qual. Reliab. Eng. Int., 36 (5): 1475-1493 (2020)Feature selection for text classification: A review., , , and . Multim. Tools Appl., 78 (3): 3797-3816 (2019)Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems., , , , and . IEEE Trans. Intell. Transp. Syst., 18 (4): 814-823 (2017)ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero., , , , , , and . J. Parallel Distributed Comput., (2022)New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks., , , and . IEEE Trans. Inf. Theory, 66 (9): 5317-5321 (2020)Conditional proxy re-encryption secure against chosen-ciphertext attack., , , , and . AsiaCCS, page 322-332. ACM, (2009)