Author of the publication

Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains.

, , , , and . IEEE Trans. Dependable Secur. Comput., 18 (4): 1893-1907 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crimson: A Data Management System to Support Evaluating Phylogenetic Tree Reconstruction Algorithms., , , , , and . VLDB, page 1231-1234. ACM, (2006)RRXF: Redundancy reducing XML storage in relations., , , and . VLDB, page 189-200. Morgan Kaufmann, (2003)An Improved Over-sampling Algorithm based on iForest and SMOTE., , and . ICSCA, page 75-80. ACM, (2019)Reservoir Parameter Prediction Using Optimized Seismic Attributes Based on Gamma Test., , and . ICSCA, page 403-407. ACM, (2019)SecSkyline: Fast Privacy-Preserving Skyline Queries over Encrypted Cloud Databases., , , , , and . CoRR, (2022)Towards Secure and Accurate Targeted Mobile Coupon Delivery., , , , , , and . IEEE Access, (2016)inline-graphic not available: see fulltext : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service., , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 519-541. Springer, (2021)Efficiently Supporting Structure Queries on Phylogenetic Trees., , and . SSDBM, page 93-102. (2005)Privacy-Preserving Collaborative Analytics on Medical Time Series Data., , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1687-1702 (2022)Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN., , , , , , and . DSN, page 63-74. IEEE, (2021)