Author of the publication

An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing.

, , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discriminative Multi-View Privileged Information Learning for Image Re-Ranking., , , , , and . IEEE Trans. Image Process., (2020)GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications., , , and . IEEE Trans. Software Eng., 40 (9): 911-940 (2014)VeriDroid: automating Android application verification., and . Middleware Doctoral Symposium, page 5:1-5:6. ACM, (2013)Characterizing and Detecting Inefficient Image Displaying Issues in Android Apps., , , , , and . SANER, page 355-365. IEEE, (2019)Characterizing and detecting performance bugs for smartphone applications., , and . ICSE, page 1013-1024. ACM, (2014)Perspectives on search strategies in automated test input generation., , , , and . Frontiers Comput. Sci., 14 (3): 143202 (2020)DPAC: an infrastructure for dynamic program analysis of concurrency Java programs., , and . Middleware Doctoral Symposium, page 2:1-2:6. ACM, (2013)Large-Scale Wi-Fi Hotspot Classification via Deep Learning., , , , and . WWW (Companion Volume), page 857-858. ACM, (2017)Mining Markov chain transition matrix from wind speed time series data., , , and . Expert Syst. Appl., 38 (8): 10229-10239 (2011)Bayesian kernel machine models for testing genetic pathway effects in prostate cancer prognosis., and . Stat. Anal. Data Min., 10 (6): 378-392 (2017)