Author of the publication

A DCT-based privacy-preserving approach for efficient data mining.

, , , , , and . Security and Communication Networks, 8 (18): 3641-3652 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security-Awareness Virtual Machine Placement Scheme in the Cloud., , , , and . HPCC/EUC, page 1078-1083. IEEE, (2013)Pre-processing Boosting Twitter Sentiment Analysis?. SmartCity, page 748-753. IEEE Computer Society, (2015)Multi-Domain Neural Machine Translation with Word-Level Domain Context Discrimination., , , , , , and . EMNLP, page 447-457. Association for Computational Linguistics, (2018)A Heuristic Algorithm Based on Leadership Strategy: Leader of Dolphin Herd Algorithm (LDHA)., , and . JACIII, 19 (4): 491-499 (2015)Double shuffle relations of double zeta values and the double Eisenstein series at level N., and . J. London Math. Society, 92 (3): 520-546 (2015)A DCT-based privacy-preserving approach for efficient data mining., , , , , and . Security and Communication Networks, 8 (18): 3641-3652 (2015)Network analysis of brain functional connectivity in elderly during Beijing Opera experience., , and . BMEI, page 353-357. IEEE, (2014)Combining Semantic and Prior Polarity for Boosting Twitter Sentiment Analysis., and . SmartCity, page 832-837. IEEE Computer Society, (2015)Exploring Deep Recurrent Convolution Neural Networks for Subjectivity Classification., , , , and . IEEE Access, (2019)Comparison Research on Text Pre-processing Methods on Twitter Sentiment Analysis., and . IEEE Access, (2017)