Author of the publication

A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider.

, , , , , and . CloudNet, page 352-359. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel multi-objective immunization algorithm based on dynamic variation distance., , , , and . Swarm Evol. Comput., (December 2023)A Modified Gray Wolf Optimizer-Based Negative Selection Algorithm for Network Anomaly Detection., , , , , and . Int. J. Intell. Syst., (2023)HD-NSA: A real-valued negative selection algorithm based on hierarchy division., , , , , and . Appl. Soft Comput., (2021)A hybrid real-valued negative selection algorithm with variable-sized detectors and the k-nearest neighbors algorithm., , , , and . Knowl. Based Syst., (2021)An Attack Entity Deducing Model for Attack Forensics., , , , , and . ICONIP (15), volume 1969 of Communications in Computer and Information Science, page 340-354. Springer, (2023)Comprehensive Android Malware Detection Based on Federated Learning Architecture., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)XSS adversarial example attacks based on deep reinforcement learning., , , , , and . Comput. Secur., (2022)An Improved Crowd Aggregation Prediction Algorithm Based on ARMA., , , , , and . ICIAI, page 8-12. ACM, (2022)An immune-based risk assessment method for digital virtual assets., , , , , and . Comput. Secur., (2021)An Immune-Based Real-Time Quantitative Detection for Threat Change of Cyberspace Digital Virtual Assets., , , , , and . EECS, page 76-81. IEEE, (2019)