Author of the publication

Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack.

, , , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprinting encrypted voice traffic on smart speakers with deep learning., , , , , , , and . WISEC, page 254-265. ACM, (2020)Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data., , , , and . INFOCOM, page 2110-2118. IEEE, (2015)ROSTER: Radio Context Attestation in Cognitive Radio Network., , , , and . CNS, page 1-9. IEEE, (2018)When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data., , , and . INFOCOM, page 1-9. IEEE, (2017)MultiEvasion: Evasion Attacks Against Multiple Malware Detectors., , , and . CNS, page 10-18. IEEE, (2022)A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers., , , , and . HPCC/SmartCity/DSS, page 842-847. IEEE, (2018)Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data., , , , , , , and . CoRR, (2019)On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks., , , and . CoRR, (2024)PrivGrid: Privacy-Preserving Individual Load Forecasting Service for Smart Grid., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Towards Secure Outsourced Data Services in the Public Cloud.. Virginia Tech, Blacksburg, VA, USA, (2018)base-search.net (ftvirginiatec:oai:vtechworks.lib.vt.edu:10919/84396).