Author of the publication

LBSs privacy preserving for continuous query based on semi-honest third parties.

, , , , and . IPCCC, page 384-391. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computational probing protein-protein interactions targeting small molecules., , , and . Bioinformatics, 32 (2): 226-234 (2016)Support vector machine prediction of enzyme function with conjoint triad feature and hierarchical context., , , and . BMC Systems Biology, 5 (S-1): S6 (2011)Improving accuracy of protein-protein interaction prediction by considering the converse problem for sequence representation., , , , and . BMC Bioinformatics, (2011)Network predicting drug's anatomical therapeutic chemical code., , , and . Bioinformatics, 29 (10): 1317-1324 (2013)Kernel-based data fusion improves the drug-protein interaction prediction., , , and . Computational Biology and Chemistry, 35 (6): 353-362 (2011)Investigations on smart card-based secure protocols for autenticated key establishment in Digital pay-TV systems., , , and . IEEE ICCI, page 538-541. IEEE Computer Society, (2009)New delay-dependent exponential stability criteria of BAM neural networks with time delays., , , and . Mathematics and Computers in Simulation, 79 (5): 1679-1697 (2009)Analysis on the Influence of Modeling Errors on Sensor Dynamic Compensation., , , , and . I. J. Information Acquisition, 1 (3): 249-258 (2004)Universal fuzzy controllers based on generalized T-S fuzzy models., , , and . Fuzzy Sets and Systems, (2012)A remote pointing device by using modulated IR signals with a 2-D striped pattern., , , , and . IEEE Trans. Consumer Electronics, 59 (3): 699-704 (2013)