Author of the publication

ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage.

, , , and . ICC, page 3448-3453. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantics-Preserving Bag-of-Words Models and Applications., , and . IEEE Trans. Image Processing, 19 (7): 1908-1920 (2010)Fast Encoding Algorithms for Reed-Solomon Codes With Between Four and Seven Parity Symbols., , , , and . IEEE Trans. Computers, 69 (5): 699-705 (2020)People Summarization by Combining Named Entity Recognition and Relation Extraction., and . J. Convergence Inf. Technol., 5 (10): 233-241 (2010)A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem., , , and . Comput. Commun., (2020)Mutually beneficial learning with application to on-line news classification., , , , and . PIKM, page 85-92. ACM, (2007)Privacy Preserving on Updated Parameters in Federated Learning., , , and . ACM TUR-C, page 27-31. ACM, (2020)Motion vector modification distortion analysis-based payload allocation for video steganography., and . J. Vis. Commun. Image Represent., (2021)Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem., , , , and . IET Image Process., 13 (10): 1705-1713 (2019)Multi-level visual tracking with hierarchical tree structural constraint., , , and . Neurocomputing, (2016)Certified defense against patch attacks via mask-guided randomized smoothing., , , , and . Sci. China Inf. Sci., 65 (7): 1-12 (2022)