Author of the publication

Privacy-Preserving and Outsourced Multi-user K-Means Clustering.

, , , , and . CIC, page 80-89. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient and secure data sharing framework using homomorphic encryption in the cloud., , , and . Cloud-I, page 8. ACM, (2012)Privacy-Preserving and Outsourced Multi-user K-Means Clustering., , , , and . CIC, page 80-89. IEEE Computer Society, (2015)Privacy-Preserving and Outsourced Multi-User k-Means Clustering., , , , and . CoRR, (2014)Review of Ransomware Attacks and a Data Recovery Framework using Autopsy Digital Forensics Platform., , and . CCWC, page 605-611. IEEE, (2023)An efficient and probabilistic secure bit-decomposition., , and . AsiaCCS, page 541-546. ACM, (2013)A Privacy-Aware Framework for Friend Recommendations in Online Social Networks., and . CSE/EUC, page 182-187. IEEE, (2019)Privacy-Preserving and Outsourced Computation Framework for Power Usage Control in Smart Grids., and . SAT-CPS@CODASPY, page 1-7. ACM, (2023)A Human Error Based Approach to Understanding Programmer-Induced Software Vulnerabilities., , and . ISSRE Workshops, page 49-54. IEEE, (2020)Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss., , , , , , and . CoRR, (2021)Educational Simulation Design to Transform Learning in Earth and Environmental Sciences., , , , , , and . FIE, page 1-6. IEEE, (2020)