Author of the publication

Privacy-Preserving Compressed Reference-Oriented Alignment Map Using Decentralized Storage.

, , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy., , and . ICUFN, page 700-702. IEEE, (2018)EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples., , , and . IEEE Trans. Netw. Sci. Eng., 8 (2): 908-920 (2021)ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples., , , and . IEEE Access, (2022)PIHA: Detection method using perceptual image hashing against query-based adversarial attacks., , and . Future Gener. Comput. Syst., (August 2023)Task-Specific Adaptive Differential Privacy Method for Structured Data., , and . Sensors, 23 (4): 1980 (February 2023)A Study on Prevention and Automatic Recovery of Blockchain Networks Against Persistent Censorship Attacks., , , and . IEEE Access, (2022)Unsupervised multi-stage attack detection framework without details on single-stage attacks., , , and . Future Gener. Comput. Syst., (2019)Dynamic Nonparametric Random Forest Using Covariance., , and . Secur. Commun. Networks, (2019)Is Homomorphic Encryption-Based Deep Learning Secure Enough?, , and . Sensors, 21 (23): 7806 (2021)Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks., , , and . CNS, page 1-6. IEEE, (2019)