Author of the publication

Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.

, , , , , , and . AsiaCCS, page 71-82. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprinting encrypted voice traffic on smart speakers with deep learning., , , , , , , and . WISEC, page 254-265. ACM, (2020)Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data., , , , and . INFOCOM, page 2110-2118. IEEE, (2015)Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation., , , , and . USENIX Security Symposium, page 1739-1756. USENIX Association, (2023)Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test., , , , , , , , , and 5 other author(s). GLOBECOM, page 1-6. IEEE, (2021)Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack., , , , , and . CoRR, (2020)Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking., , , , , , and . AsiaCCS, page 71-82. ACM, (2013)RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks., , , , , , and . CoRR, (2023)ROSTER: Radio Context Attestation in Cognitive Radio Network., , , , and . CNS, page 1-9. IEEE, (2018)When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data., , , and . INFOCOM, page 1-9. IEEE, (2017)MultiEvasion: Evasion Attacks Against Multiple Malware Detectors., , , and . CNS, page 10-18. IEEE, (2022)