A New Gadget Decomposition Algorithm with Less Noise Growth in HE Schemes.
Proceedings of the Information Security Practice and Experience, 2023
A Semi-supervised Learning Based Method for Identifying Idle Virtual Machines in Managed Cloud: Application and Practice.
Proceedings of the Web Services - ICWS 2023, 2023
Adaptive Speech Quality Aware Complex Neural Network for Acoustic Echo Cancellation with Supervised Contrastive Learning.
CoRR, 2022
Learning Smooth Target-Aware Spatially Regularized Correlation Filters for UAV Tracking.
Proceedings of the 21st 2022 International Conference on Cognitive Informatics & Cognitive Computing, 2022
Encrypted data indexing for the secure outsourcing of spectral clustering.
Knowl. Inf. Syst., 2019
Research on Key Information Retrieval Method of Complex Network Based on Artificial Intelligence.
Proceedings of the Advanced Hybrid Information Processing, 2019
Research on the Classification Method of Network Abnormal Data.
Proceedings of the Advanced Hybrid Information Processing, 2019
Protecting lightweight block cipher implementation in mobile big data computing - A GPU-based approach.
Peer-to-Peer Netw. Appl., 2018
Towards effective spatial data mining : uncertainty, condensity and privacy
PhD thesis, 2017
Protecting Location Privacy in Spatial Crowdsourcing using Encrypted Data.
Proceedings of the 20th International Conference on Extending Database Technology, 2017
GPU-Based High Performance Password Recovery Technique for Hash Functions.
J. Inf. Sci. Eng., 2016
Software pipelining for graphic processing unit acceleration: Partition, scheduling and granularity.
Int. J. High Perform. Comput. Appl., 2016
Mining Co-locations from Continuously Distributed Uncertain Spatial Data.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
RCP Mining: Towards the Summarization of Spatial Co-location Patterns.
Proceedings of the Advances in Spatial and Temporal Databases, 2015
A New Approach to Multimedia Files Carving.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Bioengineering, 2014
iOS Data Recovery Using Low-Level NAND Images.
IEEE Secur. Priv., 2013
Restrictive partially blind signature for resource-constrained information systems.
Knowl. Inf. Syst., 2011
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs.
Proceedings of the Information Security Practice and Experience, 2011