Author of the publication

SecureAstraea: A Self-balancing Privacy-preserving Federated Learning Framework.

, , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-8. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient forward secure searchable encryption supporting multi-keyword query., , , and . CONF-CDS, page 12:1-12:9. ACM, (2021)Privacy Prediction of Lightweight Convolutional Neural Network., , , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 524-537. Springer, (2020)FedSCD: Federated Learning with Semi-centralization, Discrepancy-Awareness and Dual-Model Collaboration., , , , , and . ACISP (3), volume 14897 of Lecture Notes in Computer Science, page 174-192. Springer, (2024)HEND-FL: Accurate Federated Learning Using Homomorphic Encryption and a New Distributed Protocol., , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-9. IEEE, (2022)A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability., , , , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 380-398. Springer, (2023)Secure and efficient big data deduplication in fog computing., , , , and . Soft Comput., 24 (8): 5671-5682 (2020)Analysis of geographic queries in a search engine log., , , and . LocWeb, volume 300 of ACM International Conference Proceeding Series, page 49-56. ACM, (2008)I/O-efficient techniques for computing pagerank., , and . CIKM, page 549-557. ACM, (2002)A convolutional neural network based Android malware detection method with dynamic fine-tuning., , , and . ITNAC, page 300-305. IEEE, (2022)A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing., , , and . J. Inf. Secur. Appl., (2021)