Author of the publication

Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain.

, , , , and . ICCNS, page 60-69. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forward and backward secure fuzzy encryption for data sharing in cloud computing., , , and . Soft Comput., 23 (2): 497-506 (2019)Privacy-preserving constrained spectral clustering algorithm for large-scale data sets., , , , and . IET Inf. Secur., 14 (3): 321-331 (2020)A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network., , , and . ICCNS, page 79-83. ACM, (2018)Defence Against Adversarial Attacks Using Clustering Algorithm., , , , , and . ICPCSEE (1), volume 1058 of Communications in Computer and Information Science, page 323-333. Springer, (2019)Trajectory Privacy Protection Method Based on Sensitivity Analysis., , and . EITCE, page 1375-1380. ACM, (2023)An Effective Approach of Sentence Compression Based on "Re-read" Mechanism and Bayesian Combination Model., , , , and . SMP, volume 774 of Communications in Computer and Information Science, page 129-140. Springer, (2017)An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications., , , , and . CoRR, (2021)Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning., , , , and . LCN, page 371-374. IEEE, (2022)Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework., and . Inscrypt, volume 6151 of Lecture Notes in Computer Science, page 144-153. Springer, (2009)A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions., , and . J. Comb. Theory A, (2014)