Author of the publication

STEAC: Towards secure, traceable, and efficient cryptographic access control scheme in smart healthcare.

, , and . Multim. Tools Appl., 81 (21): 30069-30092 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Privacy-Preserving Federated Learning in Vehicular Fog Computing., , , , and . IEEE Trans. Veh. Technol., 71 (5): 4692-4705 (2022)Efficient biometric identity-based encryption., , , and . Inf. Sci., (2018)C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage., , , , and . IEEE Trans. Cloud Comput., 11 (2): 1911-1926 (April 2023)Joint Reinforcement Learning and Game Theory Bitrate Control Method for 360-Degree Dynamic Adaptive Streaming., , , , and . ICASSP, page 4230-4234. IEEE, (2021)Simple and Effective Stochastic Neural Networks., , , , and . AAAI, page 3252-3260. AAAI Press, (2021)Bab: A novel algorithm for training clean model based on poisoned data., , , , and . SafeAI@AAAI, volume 3381 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks., , , , and . ACM Multimedia, page 2777-2785. ACM, (2022)On the distortion of shape recovery from motion., and . Image Vis. Comput., 22 (10): 807-817 (2004)Mitigating cross-client GANs-based attack in federated learning., , and . Multim. Tools Appl., 83 (4): 10925-10949 (January 2024)Incremental and adaptive abnormal behaviour detection., and . Comput. Vis. Image Underst., 111 (1): 59-73 (2008)