From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments., , , , и . Trustcom/BigDataSE/ISPA, стр. 236-243. IEEE, (2016)Construction of network security domain knowledge graph for network attack detection., , , , , , , и . EITCE, стр. 1171-1178. ACM, (2022)Research on Blockchain Smart Contracts Vulnerability and A Code Audit Tool based on Matching Rules., , , , , и . CIAT, стр. 484-489. ACM, (2020)Testing Anti-denial of Service Attacks Based on Mobile Agent., , и . CIS, стр. 598-602. IEEE Computer Society, (2011)Privacy-Preserving k-Nearest Neighbor Computation in Multiple Cloud Environments., , , и . IEEE Access, (2016)PPolyNets: Achieving High Prediction Accuracy and Efficiency With Parametric Polynomial Activations., , , , и . IEEE Access, (2018)Almost automorphic synchronization of quaternion-valued high-order Hopfield neural networks with time-varying and distributed delays., , и . IMA J. Math. Control. Inf., 36 (3): 983-1013 (2019)Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework., , , , и . SecureComm, том 238 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 67-87. Springer, (2017)WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel Based on Memory Deduplication., , , , и . BDCloud, стр. 68-75. IEEE Computer Society, (2015)Lightweight edge-based kNN privacy-preserving classification scheme in cloud computing circumstance., , , , и . Concurr. Comput. Pract. Exp., (2020)