Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy.. Secur. Commun. Networks, 6 (10): 1281-1289 (2013)An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext., , and . JDCTA, 4 (4): 7-14 (2010)Dense Normal Based Degeneration-Aware 2-D Lidar Odometry for Correlative Scan Matching., , , , , and . IEEE Trans. Instrum. Meas., (2023)ARdetector: android ransomware detection framework., , , , and . J. Supercomput., 80 (6): 7557-7584 (April 2024)SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection., , , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 3764-3780 (December 2022)An efficient combined deep neural network based malware detection framework in 5G environment., , , , , and . Comput. Networks, (2021)Opcode sequence analysis of Android malware by a convolutional neural network., , , , and . Concurr. Comput. Pract. Exp., (2020)A provable secure sealed-bid multi-attribute auction scheme under semi-honest model.. Int. J. Commun. Syst., 27 (12): 3738-3747 (2014)Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing., , , and . Frontiers Comput. Sci., 8 (4): 656-666 (2014)A Deep Learning Framework for Predicting Protein Functions With Co-Occurrence of GO Terms., , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 20 (2): 833-842 (March 2023)