Author of the publication

Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios.

, , , , , and . Concurr. Comput. Pract. Exp., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

高分辨率遥感图像配准并行加速方法 (Parallel Acceleration Method for Very High Resolution Remote Sensing Image Registration)., and . 计算机科学, 42 (9): 29-32 (2015)Experimental Evaluation of Transformer Internal Fault Detection Based on V-I Characteristics., , , , , , and . IEEE Trans. Ind. Electron., 67 (5): 4108-4119 (2020)Efficient optimal and suboptimal radio resource allocation in OFDMA system., and . IEEE Trans. Wirel. Commun., 7 (2): 440-445 (2008)Designing Fuzzy Sets With the Use of the Parametric Principle of Justifiable Granularity., and . IEEE Trans. Fuzzy Syst., 24 (2): 489-496 (2016)FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things., , , and . Secur. Commun. Networks, (2018)Landslide Susceptibility Analysis Based on Data Field., and . J. Softw., 6 (1): 108-115 (2011)Design and Experiments of Electromagnetic Heating Forming Technology., , , , , , , , , and . IEEE Access, (2019)A Novel Information Hiding Technique for Remote Sensing Image., , and . ADMA, volume 3584 of Lecture Notes in Computer Science, page 423-430. Springer, (2005)An effective and practical gradient inversion attack., , , , , and . Int. J. Intell. Syst., 37 (11): 9373-9389 (2022)DE-RSTC: A rational secure two-party computation protocol based on direction entropy., , , , and . Int. J. Intell. Syst., 37 (11): 8947-8967 (2022)