Author of the publication

A framework for enabling user preference profiling through Wi-Fi logs.

, , , , and . ICDE, page 1550-1551. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computation-Trace Indistinguishability Obfuscation and its Applications., , , , , and . IACR Cryptology ePrint Archive, (2015)On the security models for certificateless signature schemes achieving level 3 security., and . IACR Cryptology ePrint Archive, (2011)A social network analysis on elementary student engagement in the networked creation community., , and . Comput. Educ., (2017)A 7nm 4GHz Arm®-core-based CoWoS® Chiplet Design for High Performance Computing., , , , , , , , , and 7 other author(s). VLSI Circuits, page 28-. IEEE, (2019)A 16nm 256-bit wide 89.6GByte/s total bandwidth in-package interconnect with 0.3V swing and 0.062pJ/bit power in InFO package., , , , , , , , , and 4 other author(s). Hot Chips Symposium, page 1-32. IEEE, (2016)Security Analysis of Choi et al.'s Certificateless Short Signature Scheme., , and . J. Inf. Hiding Multim. Signal Process., 4 (3): 147-154 (2013)Quantum-resistant anonymous identity-based encryption with trable identities., , , , and . IET Inf. Secur., 16 (2): 111-126 (2022)Using Channel-Wise Attention for Deep CNN Based Real-Time Semantic Segmentation With Class-Aware Edge Information., , , and . IEEE Trans. Intell. Transp. Syst., 22 (2): 1041-1051 (2021)A Secure Compressive Sensing-Based Data Gathering System via Cloud Assistance., , , , and . IEEE Access, (2018)JEDI: Joint and Effective Privacy Preserving Outsourced Set Intersection and Data Integration Protocols., and . IEEE Trans. Inf. Forensics Secur., (2023)