Author of the publication

Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks.

, , , , , and . IEEE Netw., 36 (5): 173-179 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Morphology Based Feature Identification in Image Processing.. ACFIE, volume 78 of Advances in Intelligent and Soft Computing, page 607-615. (2010)Mixture-State Document Segmentation Using Wavelet-Domain Hidden Markov Tree Models., , , and . WAA, volume 2251 of Lecture Notes in Computer Science, page 230-236. Springer, (2001)Background reconstruction from multiple images. (Reconstruction d'une scène masquée à partir de multi-image).. University of Paris-Saclay, France, (2018)Study on image feature recognition algorithm and its application in public security management., , and . Int. J. Inf. Technol. Manag., 18 (2/3): 284-296 (2019)Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things., , , , , and . IEEE Internet Things J., 9 (4): 2468-2484 (2022)A lightweight delegated private set intersection cardinality protocol., , , and . Comput. Stand. Interfaces, (January 2024)Poster: Emotion-Aware Smart Tips for Healthy and Happy Sleep., , , , , , , , and . MobiCom, page 549-551. ACM, (2017)Study on Image Segmentation Algorithm Based on Fuzzy Mathematical Morphology., and . ACFIE, volume 54 of Advances in Soft Computing, page 488-495. (2008)Study on Sign Language Recognition Fusion Algorithm Using FNN.. ACFIE, volume 78 of Advances in Intelligent and Soft Computing, page 617-626. (2010)CCA-Secure Deterministic Identity-Based Encryption Scheme., , , , , and . J. Univers. Comput. Sci., 25 (3): 245-269 (2019)