Author of the publication

Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT.

, , , , and . Secur. Commun. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Availability Analysis Method of Multilevel Security Models with Credibility Characteristics, , , and . Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, 1, page 175-178. (April 2009)Novel Distance and Similarity Measures on Hesitant Fuzzy Linguistic Term Sets and Their Application in Clustering Analysis., , , and . IEEE Access, (2019)Energy harvesting from human motion for wearable devices., , , , and . NEMS, page 409-412. IEEE, (2015)Global Workspace and Direct Cortex Access: An Astral Framework for Consciousness., , and . IC-AI, page 521-524. CSREA Press, (2004)Low-Latency Edge Video Analytics for On-Road Perception of Autonomous Ground Vehicles., , , , , and . IEEE Trans. Ind. Informatics, 19 (2): 1512-1523 (2023)A novel non-convex low-rank tensor approximation model for hyperspectral image restoration., , , , , and . Appl. Math. Comput., (2021)Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing., , , , , and . IEEE Access, (2018)Remaining useful life prediction of lithium-ion battery based on auto-regression and particle filter., and . Int. J. Intell. Comput. Cybern., 14 (2): 218-237 (2021)Robust Interior Point Method for Quantum Key Distribution Rate Computation., , , , and . Quantum, (September 2022)Incremental image retrieval method based on feature perception and deep hashing., , , , and . Int. J. Multim. Inf. Retr., 13 (1): 10 (March 2024)