Author of the publication

Privacy-Preserving Top-k Nearest Keyword Search on Outsourced Graphs.

, , , and . Trustcom/BigDataSE/ISPA, page 815-822. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud., , , and . Secur. Commun. Networks, 8 (17): 3205-3218 (2015)Spatio-Textual Group Skyline Query., , , , , and . DASFAA (Workshops), volume 13922 of Lecture Notes in Computer Science, page 34-50. Springer, (2023)Privacy-Preserving Top-k Spatial Keyword Queries in Untrusted Cloud Environments., , , , , and . IEEE Trans. Serv. Comput., 11 (5): 796-809 (2018)Signature-Based Secure Trajectory Similarity Search., , , , , and . TrustCom, page 196-206. IEEE, (2021)SeTS3: A Secure Trajectory Similarity Search System., , , , , and . DASFAA (3), volume 13247 of Lecture Notes in Computer Science, page 522-526. Springer, (2022)Privacy-Preserving Top-k Nearest Keyword Search on Outsourced Graphs., , , and . Trustcom/BigDataSE/ISPA, page 815-822. IEEE, (2016)Research on an Adaptive Neural Network K-Pixel Adversarial Example Generation Algorithm., , , , and . J. Circuits Syst. Comput., 31 (1): 2250007:1-2250007:22 (2022)Exploiting Non-visible Relationship in Link Prediction Based on Asymmetric Local Random Walk., , , , and . ICONIP (5), volume 10638 of Lecture Notes in Computer Science, page 731-740. Springer, (2017)Privacy-Preserving Top-k Spatial Keyword Queries over Outsourced Database., , , , and . DASFAA (1), volume 9049 of Lecture Notes in Computer Science, page 589-608. Springer, (2015)Secure Spatio-textual Skyline Queries on Cloud Platform., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 251-259. IEEE, (2020)