Author of the publication

Enabling secure and effective near-duplicate detection over encrypted in-network storage.

, , , and . INFOCOM, page 1-9. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Algorithm for Computation Offloading in Mobile Edge Computing., , , , , and . ICCBN, page 129-133. ACM, (2021)Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques., , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 620-636 (2023)A novel image scrambling degree blind evaluation scheme based on Bhattacharyya coefficient., and . CSNDSP, page 161-165. IEEE, (2014)Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery., , , and . IEEE Trans. Dependable Secur. Comput., 17 (1): 121-133 (2020)A New Algorithm for Classification Based on Multi-classifiers Learning., , and . GSKI (2), volume 849 of Communications in Computer and Information Science, page 254-262. Springer, (2017)XKvalidator: a constraint validator for XML., , and . CIKM, page 446-452. ACM, (2002)BLAS: An Efficient XPath Processing System., , and . SIGMOD Conference, page 47-58. ACM, (2004)Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness., , , and . ICETE (2), page 295-301. ScitePress, (2020)Computation Offloading in Mobile Edge Computing-Enabled Blockchain using Matching and Contract Theory., , , , and . ICNCC, page 233-238. ACM, (2023)Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization., , , , , and . PerCom, page 1-10. IEEE, (2019)