Author of the publication

IGAMT: Privacy-Preserving Electronic Health Record Synthesization with Heterogeneity and Irregularity.

, , , , , , and . AAAI, page 15634-15643. AAAI Press, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless and Mobile Networks: Security and Privacy Issues., , and . J. Electr. Comput. Eng., (2017)Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications., , , , and . J. Medical Syst., 40 (12): 268:1-268:12 (2016)Generative UAP attacks against deep-learning based modulation classification., , and . IET Commun., 17 (9): 1091-1102 (June 2023)A secure chaotic map-based remote authentication scheme for telecare medicine information systems., , , , , and . Future Gener. Comput. Syst., (2018)A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks., , , , , , and . Future Gener. Comput. Syst., (2018)An Adaptive Feature-fusion Method for Object Matching over Non-overlapped Scenes., , , and . J. Signal Process. Syst., 76 (1): 77-89 (2014)ESP Spoofing: Covert Acoustic Attack on MEMS Gyroscopes in Vehicles., , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Robust three-factor remote user authentication scheme with key agreement for multimedia systems., , , , and . Secur. Commun. Networks, 9 (13): 1916-1927 (2016)Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS., , , , and . Secur. Commun. Networks, 9 (13): 1983-2001 (2016)DPCube: Differentially Private Histogram Release through Multidimensional Partitioning., , , , and . Trans. Data Priv., 7 (3): 195-222 (2014)