Author of the publication

Secure and verifiable outsourcing protocol for non-negative matrix factorisation.

, , and . IJHPCN, 11 (1): 14-23 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prediction of Soil Nutrient Contents Using Visible and Near-Infrared Reflectance Spectroscopy., , , , , and . ISPRS Int. J. Geo Inf., 8 (10): 437 (2019)Estimation of Soil Heavy Metal Content Using Hyperspectral Data., , , , , and . Remote. Sens., 11 (12): 1464 (2019)Reducing the Service Function Chain Backup Cost Over the Edge and Cloud by a Self-Adapting Scheme., , , and . IEEE Trans. Mob. Comput., 21 (8): 2994-3008 (2022)Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme., and . Int. J. Netw. Secur., 21 (2): 177-190 (2019)Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe., , and . Int. J. Netw. Secur., 19 (2): 272-284 (2017)Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems., , , , and . IEEE Access, (2019)Special Issue on the Work-in-Progress (WIP) session at the ACM SIGMETRICS 2018 Conference., and . SIGMETRICS Perform. Evaluation Rev., 46 (2): 76 (2018)Integration of Results From Convolutional Neural Network in a Support Vector Machine for the Detection of Atrial Fibrillation., , , , , and . IEEE Trans. Instrum. Meas., (2021)Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption., , , and . KSII Trans. Internet Inf. Syst., 15 (1): 323-342 (2021)Active Optimization Method for Power Loss Distribution in T-Type Three-Level Converter Under Half-Wave Symmetry SHEPWM., and . IEEE Trans. Ind. Electron., 70 (10): 9731-9740 (October 2023)