Author of the publication

Enabling Secure and Efficient Video Delivery Through Encrypted In-Network Caching.

, , , , , , , and . IEEE J. Sel. Areas Commun., 34 (8): 2077-2090 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a scalable, private, and searchable key-value store., , , , and . CNS, page 773-774. IEEE, (2015)Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing., , , , and . IEEE Trans. Multim., 18 (10): 2002-2014 (2016)RAI4IoE: Responsible AI for Enabling the Internet of Energy., , , , , , , and . TPS-ISA, page 13-22. IEEE, (2023)Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy., , , , , , , and . NDSS, The Internet Society, (2021)Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves., , , , and . ACNS (1), volume 12726 of Lecture Notes in Computer Science, page 50-75. Springer, (2021)Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation., , , and . AsiaCCS, page 337-350. ACM, (2022)Defending Against Misclassification Attacks in Transfer Learning., , , , , and . CoRR, (2019)Exploiting and Securing ML Solutions in Near-RT RIC: A Perspective of an xApp., , , , , , , and . CoRR, (2024)Towards Private Multi-operator Network Slicing., , , , and . ACISP (3), volume 14897 of Lecture Notes in Computer Science, page 359-379. Springer, (2024)Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts., , , , and . CoRR, (2024)