Author of the publication

Task-Driven ADDIE-Twist Model With a Teach-Study Double-Helix Structure.

, , , , , , , , , and . IEEE Trans. Educ., 67 (1): 1-10 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Revocable Outsourcing Attribute-Based Encryption Scheme., , , , , , and . CloudComp, volume 197 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-161. Springer, (2016)Secure HARQ-IR-Aided Terahertz Communications., , , , , , and . ICCC Workshops, page 1-6. IEEE, (2023)Privacy-Preserving Distributed Machine Learning Made Faster., , , , , , , and . SecTL@AsiaCCS, page 2:1-2:14. ACM, (2023)An Efficient Integer-Wise ReLU on TFHE., , , , , and . ACISP (1), volume 14895 of Lecture Notes in Computer Science, page 161-179. Springer, (2024)AI-Based Advanced Approaches and Dry Eye Disease Detection Based on Multi-Source Evidence: Cases, Applications, Issues, and Future Directions., , , , , , , , , and 6 other author(s). Big Data Min. Anal., 7 (2): 445-484 (2024)SOAPTyping: an open-source and cross-platform tool for sequence-based typing for HLA class I and II alleles., , , , , , , , , and 5 other author(s). BMC Bioinform., 21 (1): 295 (2020)Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework., , , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 333-346. Springer, (2016)Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT., , , , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 484-490. Springer, (2018)FSSiBNN: FSS-Based Secure Binarized Neural Network Inference with Free Bitwidth Conversion., , , , , and . ESORICS (1), volume 14982 of Lecture Notes in Computer Science, page 229-250. Springer, (2024)LPFHE: Low-Complexity Polynomial CNNs for Secure Inference over FHE., , , and . ESORICS (3), volume 14984 of Lecture Notes in Computer Science, page 403-423. Springer, (2024)