Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension., and . CSEE (2), volume 215 of Communications in Computer and Information Science, page 131-136. Springer, (2011)An Efficient Threshold Group Signature Scheme., and . IMECS, page 338-340. Newswood Limited, (2007)Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing., , , , and . IEEE Access, (2018)Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security., , , , and . IEEE Syst. J., 17 (4): 5519-5530 (December 2023)A Software-Defined Intelligent Method for Antenna Design., , , , , and . DASC, page 470-474. IEEE Computer Society, (2014)INTB: A New FPGA Interconnect Model for Architecture Exploration., , , , , and . FPGA, page 325. ACM, (2020)How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN., , , and . ACSAC, page 126-137. ACM, (2019)Multimodal optimization problem in contamination source determination of water supply networks., , , and . Swarm Evol. Comput., (2019)An indicator and adaptive region division based evolutionary algorithm for many-objective optimization., , , and . Appl. Soft Comput., (2021)Domain Knowledge-Based Evolutionary Reinforcement Learning for Sensor Placement., , , and . Sensors, 22 (10): 3799 (2022)