A Generic Data Synthesis Framework for Privacy-Preserving Point-of-Interest Recommender Systems.
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023
A Lidar Information-based Privacy-Preserving Authentication Scheme Using Elliptic Curve Cryptosystem in VANETs.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
Cocoons counting and classification based on image processing.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020
Joint dictionary learning using a new optimization method for single-channel blind source separation.
Speech Commun., 2019
Text-independent speaker identification based on deep Gaussian correlation supervector.
Int. J. Speech Technol., 2019
On the q-bentness of Boolean functions.
Des. Codes Cryptogr., 2019
Deep and shallow features fusion based on deep convolutional neural network for speech emotion recognition.
Int. J. Speech Technol., 2018
A parallel time-memory tradeoff attack on the Hill cipher.
Cryptologia, 2018
Correlation immune functions with respect to the q-transform.
Cryptogr. Commun., 2018
Statistical properties of half-ℓ-sequences.
Cryptogr. Commun., 2016
Distribution Properties of Half- \ell -Sequence.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014
A Real-Time Hand Gesture Recognition Approach Based on Motion Features of Feature Points.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014