Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approximation method of origin-destination flow traffic from link load counts., , , , , and . Comput. Electr. Eng., 37 (6): 1106-1121 (2011)A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage., , , , and . Concurr. Comput. Pract. Exp., 28 (10): 2858-2876 (2016)Geometric Searchable Encryption for Privacy-Preserving Location-Based Services., , , , and . IEEE Trans. Serv. Comput., 16 (4): 2672-2684 (July 2023)Comments on FHH Anonymous Multireceiver Encryption., , , and . Int. J. Netw. Secur., 16 (5): 397-400 (2014)An efficient algorithm for complete active space valence bond self-consistent field calculation., , , and . J. Comput. Chem., 34 (1): 38-48 (2013)How to Accelerate Capsule Convolutions in Capsule Networks., , , and . CoRR, (2021)Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks., , , , , and . Mob. Inf. Syst., (2015)GPU-Accelerated High-Throughput Online Stream Data Processing., , , , , and . IEEE Trans. Big Data, 4 (2): 191-202 (2018)Domain-Specific Chinese Word Segmentation Based on Bi-Directional Long-Short Term Memory Model., , , , , , and . IEEE Access, (2019)Geometric Searchable Encryption Without False Positive And Its Applications., , , , and . Comput. J., 66 (9): 2155-2168 (September 2023)