Author of the publication

A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data.

, , , , , , and . ICA3PP (3), volume 9530 of Lecture Notes in Computer Science, page 667-681. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rasterization Computing-Based Parallel Vector Polygon Overlay Analysis Algorithms Using OpenMP and MPI., , , , , and . IEEE Access, (2018)Research on bionic olfactory temperature compensation mechanism., , , , , and . ICARM, page 316-321. IEEE, (2017)Laser-Machined Microcavities for Simultaneous Measurement of High-Temperature and High-Pressure., , , , , , , , and . Sensors, 14 (8): 14330-14338 (2014)Multiple Rotorcrafts Environment Map Fusion for Atmosphere Monitoring., , , , and . ICSCIB, volume 890 of Advances in Intelligent Systems and Computing, page 101-113. Springer, (2018)Workflow Task Scheduling Algorithm Based on IFCM and IACO., , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 377-388. Springer, (2018)Learning Robust Weighted Group Sparse Graph for Discriminant Visual Analysis., , , , , and . Neural Processing Letters, 49 (1): 203-226 (2019)Adaptive radar detection and estimation: edited by Simon Haykin, Communication Research Laboratory, McMaster University, Hamilton, Ontario, Canada and Allan Steinhardt, Department of Electrical Engineering, Cornel University, Ithaca, New York, Wiley Series in Remote Sensing. Publishers: John Wiley and Sons, 1992, ISBN 0-471-544468-X.. Signal Process., 31 (2): 236 (1993)A Fourier integral algorithm and its GPU/CPU collaborative implementation for one-way wave equation migration., , , and . Comput. Geosci., (2012)Mubug: a mobile service for rapid bug tracking., , , , and . Sci. China Inf. Sci., 59 (1): 1-5 (2016)Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks., , and . IEEE Communications Letters, 20 (9): 1772-1775 (2016)