Author of the publication

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack.

, , , and . Sci. China Inf. Sci., 60 (5): 052105:1-052105:12 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Doubly Robust Learning Framework for Debiasing Post-Click Conversion Rate Prediction., , , , , , , and . KDD, page 252-262. ACM, (2022)Analysis of Human Factor in Air Traffic Control Unsafe Events Based on Improved DECIDE Model., , , and . HCI (5), volume 12185 of Lecture Notes in Computer Science, page 365-374. Springer, (2020)An effective algorithm in radar image processing., , , and . IGARSS, page 4255-4257. IEEE, (2004)Multiuser Wireless Power Transfer via Magnetic Resonant Coupling: Performance Analysis, Charging Control, and Power Region Characterization., and . IEEE Trans. Signal and Information Processing over Networks, 2 (1): 72-83 (2016)Classifying Supplement Use Status in Clinical Notes., , , , and . CRI, AMIA, (2017)Free-living eating event spotting using EMG-monitoring eyeglasses., and . BHI, page 128-132. IEEE, (2018)Energy-Efficient Data Collection in UAV Enabled Wireless Sensor Network., , and . CoRR, (2017)Cooperative Feedback for MIMO Interference Channels, and . CoRR, (2010)A novel parallel implementation of partial distortion search algorithm based on template search., , and . Multimedia Tools Appl., 77 (16): 20615-20628 (2018)On Peak versus Average Interference Power Constraints for Spectrum Sharing in Cognitive Radio Networks. CoRR, (2008)