Author of the publication

Privacy-Preserving Interest-Ability Based Task Allocation in Crowdsourcing.

, , , , and . ICC, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Upper Bounds on Systematic-Length for Linear Minimum Storage Regenerating Codes., , and . CoRR, (2016)Security Concerns in Minimum Storage Cooperative Regenerating Codes., , and . IEEE Trans. Inf. Theory, 62 (11): 6218-6232 (2016)Lightweight edge-based kNN privacy-preserving classification scheme in cloud computing circumstance., , , , and . Concurr. Comput. Pract. Exp., (2020)Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments., , , and . World Wide Web, 22 (1): 101-123 (2019)Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database., , , , and . IEEE Access, (2018)Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT., , , , , and . IEEE Trans. Emerg. Top. Comput., 10 (2): 933-947 (2022)Research on the Application of Reinforcement Learning in Network Security., , , , , and . ICCEIC, page 31-34. IEEE, (2023)Bitcoin Fast Payment Protocol Based on Chameleon Authentication Tree., , , , and . ICCEIC, volume 3344 of CEUR Workshop Proceedings, page 161-167. CEUR-WS.org, (2022)The Effect of Matching Block Resolution on IP Softcore Hardware Trojans Map Detection., , , , and . ICAIT, page 289-294. IEEE, (2023)Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor., , , and . IET Commun., 8 (12): 2106-2113 (2014)