Author of the publication

Secret Sharing in the Encrypted Domain with Secure Comparison.

, and . GLOBECOM, page 1-5. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active model selection for Graph-Based Semi-Supervised Learning., , , and . ICASSP, page 1881-1884. IEEE, (2008)Hazardous material sign detection and recognition., , , , and . ICIP, page 2640-2644. IEEE, (2013)Design of Virtual Spinal Fixation Surgery System Architecture., , and . ISIA, volume 86 of Communications in Computer and Information Science, page 546-553. Springer, (2010)Malicious web page detection based on on-line learning algorithm., , , and . ICMLC, page 1914-1919. IEEE, (2011)SLFE: A New Semi-supervised Local Feature Extraction Algorithm., , and . CBD, page 304-310. IEEE Computer Society, (2015)Roughness in m-semilattices1., , and . Journal of Intelligent and Fuzzy Systems, 30 (4): 2331-2338 (2016)Sparse Output Coding for Large-Scale Visual Recognition., and . CVPR, page 3350-3357. IEEE Computer Society, (2013)Hierarchical Feature Hashing for Fast Dimensionality Reduction., and . CVPR, page 2051-2058. IEEE Computer Society, (2014)WMV-Algebra and Its Wajsberg's form., , and . ISKE, page 526-533. IEEE, (2015)Long-Term Dynamic of Poyang Lake Surface Water: A Mapping Work Based on the Google Earth Engine Cloud Platform., , , , , and . Remote Sensing, 11 (3): 313 (2019)