Author of the publication

Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption".

, , and . IEEE Trans. Inf. Forensics Secur., 11 (4): 866-867 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gray BP neural network based prediction of rice protein interaction network., , , , and . Clust. Comput., 22 (Supplement): 4165-4171 (2019)Using Deep Neural Networks to Improve the Performance of Protein-Protein Interactions Prediction., , , and . Int. J. Pattern Recognit. Artif. Intell., 34 (13): 2052012:1-2052012:20 (2020)A Task Scheduling Problem in Mobile Robot Fulfillment Systems., and . ICACI, page 391-396. IEEE, (2020)A Comprehensive Approach to the Generation of Human-Like Arm Movements on Robot NAO.. IEEE Access, (2020)FLPA: A fast label propagation algorithm for detecting overlapping community structure., , , and . Expert Syst. Appl., (December 2023)A two-phase iterative machine learning method in identifying mechanical biomarkers of peripheral neuropathy., , and . Expert Syst. Appl., (2021)A Novel Method to Derive Exospheric Temperatures from Swarm Thermospheric Densities during Quiet Times., , , and . Remote. Sens., 14 (21): 5382 (2022)MSST-Net: A Multi-Scale Adaptive Network for Building Extraction from Remote Sensing Images Based on Swin Transformer., and . Remote. Sens., 13 (23): 4743 (2021)Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective., , , and . IEEE Trans. Mob. Comput., 12 (7): 1428-1442 (2013)Image restoration via exponential scale mixture-based simultaneous sparse prior., , and . IET Image Process., 16 (12): 3268-3283 (2022)