Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Data Deduplication Scheme Based on DBSCAN With Tolerable Clustering Deviation., , , and . IEEE Access, (2023)Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions., , , , , , and . IEEE Access, (2019)Accelerating Public Key Cryptography in Android Platforms., , , , , , and . BigCom, page 245-249. IEEE, (2019)Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier., , , , and . IEEE Internet Things J., 9 (21): 21648-21661 (2022)Query on the cloud: improved privacy-preserving k-nearest neighbor classification over the outsourced database., , , , and . World Wide Web (WWW), 26 (4): 1747-1774 (July 2023)Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment., , and . Int. J. Distributed Sens. Networks, (2020)Secure Encrypted Data Deduplication Based on Data Popularity., , , and . Mob. Networks Appl., 26 (4): 1686-1695 (2021)Semantics aware adversarial malware examples generation for black-box attacks., , , and . Appl. Soft Comput., (2021)A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems., , , , , , , , and . IEEE Trans. Ind. Informatics, 16 (3): 2091-2101 (2020)Privacy-preserving categorization of mobile applications based on large-scale usage data., , , , , and . Inf. Sci., (2020)