Author of the publication

SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition.

, , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 309-329. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A TLP approach for BGP based on local speculation., , , , and . Sci. China Ser. F Inf. Sci., 51 (11): 1772-1784 (2008)In silico drug design of inhibitor of nuclear factor kappa B kinase subunit beta inhibitors from 2-acylamino-3-aminothienopyridines based on quantitative structure-activity relationships and molecular docking., , , , , , , and . Comput. Biol. Chem., (2019)Application of Fiber Bragg Grating Acoustic Emission Sensors in Thin Polymer-Bonded Explosives., , , and . Sensors, 18 (11): 3778 (2018)Recommending Users and Communities in Social Media., , , , and . ACM Trans. Knowl. Discov. Data, 10 (2): 17:1-17:27 (2015)Understanding the Influence of Network Topology and Network-layer Naming on the Scalability of Routing., , , , and . J. Commun., 8 (10): 672-680 (2013)Intelligent Behavior Data Analysis for Internet Addiction., , and . Sci. Program., (2019)Minimizing energy consumptions in wireless sensor networks via two-modal transmission., and . Comput. Commun. Rev., 40 (1): 12-18 (2010)A novel analytical method for maximum likelihood detection in MIMO multiplexing systems., , , and . IEEE Trans. Commun., 57 (8): 2264-2268 (2009)A study of IP prefix hijacking in cloud computing networks., , and . Secur. Commun. Networks, 7 (11): 2201-2210 (2014)AutoAccel: Automated Accelerator Generation and Optimization with Composable, Parallel and Pipeline Architecture., , , and . CoRR, (2018)