Author of the publication

New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server.

, , , , , and . ICC, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical Methods for the Wigner Equation with Unbounded Potential., , and . J. Sci. Comput., 79 (1): 345-368 (2019)Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing., , , , , and . ICC, page 1-6. IEEE, (2018)Secure and verifiable outsourced data dimension reduction on dynamic data., , , , , and . Inf. Sci., (2021)Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization., , , , , and . IEEE Trans. Serv. Comput., 15 (1): 266-278 (2022)Comparison of numerical treatments for the pseudo-differential term in the Wigner equation.. CoRR, (2022)Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things., , , , , and . IEEE Internet Things J., 8 (7): 5839-5849 (2021)An Advective-Spectral-Mixed Method for Time-Dependent Many-Body Wigner Simulations., , and . SIAM J. Sci. Comput., (2016)LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check., , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN., , , , and . Knowl. Based Syst., (2023)A high order efficient numerical method for 4-D Wigner equation of quantum double-slit interferences., , and . J. Comput. Phys., (2019)