Choo, Kim-Kwang Raymond
1329  Ergebnisse:
Personensuche X
?
1

Encrypted Domain Secret Medical-Image Sharing With Secure O..:

Huang, Jingwang ; Cui, Qi ; Zhou, Zhili...
IEEE Internet of Things Journal.  11 (2024)  2 - p. 2382-2393 , 2024
 
?
2

Forward Private Verifiable Dynamic Searchable Symmetric Enc..:

Guo, Cheng ; Li, Wenfeng ; Tang, Xinyu..
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  2 - p. 746-763 , 2024
 
?
3

GPU Accelerated Full Homomorphic Encryption Cryptosystem, L..:

Li, Xiaodong ; Gao, Hehe ; Zhang, Jianyi...
IEEE Internet of Things Journal.  11 (2024)  4 - p. 6893-6903 , 2024
 
?
5

Oasis: Online All-Phase Quality-Aware Incentive Mechanism f..:

Zhang, Man ; Li, Xinghua ; Miao, Yinbin...
IEEE Transactions on Services Computing.  17 (2024)  2 - p. 589-603 , 2024
 
?
 
?
9

AdvEWM: Generating image adversarial examples by embedding ..:

Xiang, Yuexin ; Li, Tiantian ; Ren, Wei...
Journal of Information Security and Applications.  80 (2024)  - p. 103662 , 2024
 
?
11

Cryptographic Primitives in Privacy-Preserving Machine Lear..:

Qin, Hong ; He, Debiao ; Feng, Qi...
IEEE Transactions on Knowledge and Data Engineering.  36 (2024)  5 - p. 1919-1934 , 2024
 
?
12

An incentive compatible ZD strategy-based data sharing mode..:

Jie, Yingmo ; Liu, Charles Zhechao ; Choo, Kim-Kwang Raymond.
European Journal of Operational Research.  315 (2024)  2 - p. 764-776 , 2024
 
?
13

Efficient Privacy-Preserving Federated Learning With Improv..:

Zhang, Yifan ; Miao, Yinbin ; Li, Xinghua...
IEEE Transactions on Industrial Informatics.  20 (2024)  3 - p. 3316-3326 , 2024
 
?
 
?
15

Optimal Selfish Mining-Based Denial-of-Service Attack:

Wang, Qiuhua ; Li, Chengyu ; Xia, Tianyu...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 835-850 , 2024
 
1-15