Author of the publication

Multi-authority Attribute-Based Encryption Access Control Scheme with Hidden Policy and Constant Length Ciphertext for Cloud Storage.

, , and . DSC, page 205-212. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural-network-based modeling and dynamic policy synthesis for model predictive control of nonlinear systems., , and . ICARCV, page 265-270. IEEE, (2014)A Source Prediction System for Dynamic Networks Based on TDOA Measurements., , , and . IEEE Trans. Netw. Sci. Eng., 8 (3): 2388-2401 (2021)Semidefinite Relaxation for Moving Target Localization in Asynchronous MIMO Systems., , and . IEEE Trans. Commun., 72 (2): 1075-1089 (2024)A joint time synchronization and localization method without known clock parameters., and . Pervasive Mob. Comput., (2017)Multi-Scale Feature Fusion Network for Remote Sensing Image Captioning., , , and . Geoinformatics, page 1-4. IEEE, (2023)Re-Attention for Visual Question Answering., , , , , and . AAAI, page 91-98. AAAI Press, (2020)Group Key Management in Grid Environment., , , , and . IMSCCS (1), page 626-631. IEEE Computer Society, (2006)uDisC: An Ultra-Lightweight and Distributed Scheme for Defending against Data Loss Attack in RFID Networks., , , and . ISICA, volume 316 of Communications in Computer and Information Science, page 66-73. Springer, (2012)MC-Net: multi-scale contextual information aggregation network for image captioning on remote sensing images., , , , , , and . Int. J. Digit. Earth, 16 (2): 4848-4866 (December 2023)Intracranial Hematoma Classification Based on the Pyramid Hierarchical Bilinear Pooling., , , and . PRCV (3), volume 13021 of Lecture Notes in Computer Science, page 606-617. Springer, (2021)