Author of the publication

Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries.

, , , , , and . GLOBECOM, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Business intelligence in the cloud: A case of Pakistan., , , and . CCIS, page 536-540. IEEE, (2011)Segmenting the prostate and rectum in CT imagery using anatomical constraints., , and . Medical Image Anal., 15 (1): 1-11 (2011)Fast and efficient algorithm for matrix completion via closed-form 2/3-thresholding operator., , , and . Neurocomputing, (2019)Automated Transfer for Reinforcement Learning Tasks., , , and . Künstliche Intell., 28 (1): 7-14 (2014)Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation., , , , , and . IEEE Internet Things J., 7 (7): 5783-5791 (2020)Optimal controls for nonlocal Cauchy problems of multi-term fractional evolution equations., and . IMA J. Math. Control. Inf., 39 (3): 912-929 (2022)Predicting delayed methotrexate elimination in pediatric acute lymphoblastic leukemia patients: an innovative web-based machine learning tool developed through a multicenter, retrospective analysis., , , , , , , , , and 3 other author(s). BMC Medical Informatics Decis. Mak., 23 (1): 148 (December 2023)Discovering group-based transnational cyber fraud actives: A polymethodological view., , , , and . Comput. Secur., (2021)Community Detection in Large Directed Graphs., and . BDA, volume 13773 of Lecture Notes in Computer Science, page 172-181. Springer, (2022)Estimating Spline-Based Nonhomogeneous Poisson Intensities Using Constrained Quadratic Programming., , and . WSC, page 339-350. IEEE, (2023)