Author of the publication

Privacy-preserving constrained spectral clustering algorithm for large-scale data sets.

, , , , and . IET Inf. Secur., 14 (3): 321-331 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forward-secure identity-based signature with efficient revocation., , and . Int. J. Comput. Math., 94 (7): 1390-1411 (2017)Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions., , and . SETA, volume 8865 of Lecture Notes in Computer Science, page 21-33. Springer, (2014)Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage., , and . IEEE Syst. J., 12 (2): 1731-1742 (2018)MAA-PTG: multimodal aspect-aware product title generation., , , , and . J. Intell. Inf. Syst., 59 (1): 213-235 (2022)Anomaly detection in images with shared autoencoders., and . Frontiers Neurorobotics, (September 2022)Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain., , , , and . ICCNS, page 60-69. ACM, (2020)Outlier Detection Method based on Improved K-means Clustering Algorithm., , and . EITCE, page 1350-1355. ACM, (2021)An Effective Approach of Sentence Compression Based on "Re-read" Mechanism and Bayesian Combination Model., , , , and . SMP, volume 774 of Communications in Computer and Information Science, page 129-140. Springer, (2017)一种多参量评估的云计算信任模型 (Trust Model of Cloud Computing Based on Multi-parameters Evaluation)., , and . 计算机科学, 42 (Z6): 315-320 (2015)Composition of Boolean functions: An application to the secondary constructions of bent functions., , , and . Discret. Math., 343 (3): 111711 (2020)