Author of the publication

A Security Scheme of Big Data Identity for Cloud Environment.

, , , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 497-506. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A High-Order Level-Set Method with Enhanced Stability for Curvature Driven Flows and Surface Diffusion Motion., and . J. Sci. Comput., 69 (3): 1316-1345 (2016)Analysis and Research Based on Differential Privacy Protection Related Algorithms., , , , and . PAAP, page 126-133. IEEE, (2018)Unsupervised Flight Phase Recognition with Flight Data Clustering based on GMM., , , and . I2MTC, page 1-6. IEEE, (2020)Distribution Aware Collaborative Spread Replication for Rare Objects in Unstructured Peer-to-Peer Networks., , and . J. Networks, 8 (5): 991-998 (2013)Model reduction for discrete-time Markov jump Lur'e systems with time-varying delays in a unified framework., and . J. Frankl. Inst., 352 (11): 5003-5023 (2015)BoRe: Adapting to Reader Consumption Behavior Instability for News Recommendation., , and . ACM Trans. Inf. Syst., 38 (1): 3:1-3:33 (2020)Paraphrasing spoken Chinese using a paraphrase corpus., and . Nat. Lang. Eng., 11 (4): 417-434 (2005)Application research on the chaos synchronization self-maintenance characteristic to secret communication., , and . Sci. China Ser. F Inf. Sci., 50 (4): 609-614 (2007)Mining user preferences of new locations on location-based social networks: a multidimensional cloud model approach., , , and . Wireless Networks, 24 (1): 113-125 (2018)Word Alignment Annotation in a Japanese-Chinese Parallel Corpus., , , , and . LREC, European Language Resources Association, (2008)