Author of the publication

Confidentially Computing DNA Matching Against Malicious Adversaries.

, , , , and . SmartCom, volume 13828 of Lecture Notes in Computer Science, page 165-174. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RTDCM: A Coding Preemption Collection System for Key Data Prioritization With Hierarchical Probability Exchange Mechanism in Mobile Computing., , , and . IEEE Access, (2020)State of Charge Estimation of Lithium-Ion Batteries Based on Temporal Convolutional Network and Transfer Learning., , , , and . IEEE Access, (2021)An Effective Crowdsourcing Data Reporting Scheme to Compose Cloud-Based Services in Mobile Robotic Systems., , , , , and . IEEE Access, (2018)A New Filter Feature Selection Based on Criteria Fusion for Gene Microarray Data., , , and . IEEE Access, (2018)JOET: Sustainable Vehicle-assisted Edge Computing for IoT devices., , , and . J. Syst. Archit., (2022)FedGraph-KD: An Effective Federated Graph Learning Scheme Based on Knowledge Distillation., , , and . BigDataSecurity/HPSC/IDS, page 130-134. IEEE, (2023)A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 49 (2): 317-332 (2019)MIDP: An MDP-based intelligent big data processing scheme for vehicular edge computing., , , , and . J. Parallel Distributed Comput., (2022)HCNCT: A Cross-chain Interaction Scheme for the Blockchain-based Metaverse., , , and . ACM Trans. Multim. Comput. Commun. Appl., 20 (7): 188:1-188:23 (July 2024)DOE: a dynamic object elimination scheme based on geometric and semantic constraints., , , , and . Connect. Sci., (December 2023)