Author:
Li Yanbin,Huang Yuxin,Tang Ming,Ren Shougang,Xu Huanliang
Publisher
Springer International Publishing
Reference25 articles.
1. Ge, C., Susilo, W., Liu, Z., Xia, J., Szalachowski, P., Liming, F.: Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans. Dependable Secure Comput. https://doi.org/10.1109/TDSC.2020.2963978
2. Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., Fang, L.: Revocable attribute-based encryption with data integrity in clouds. IEEE Trans. Dependable Secure Comput. https://doi.org/10.1109/TDSC.2021.3065999
3. Ge, C., Liu, Z., Fang, L., Ling, H., Zhang, A., Yin, C.: A hybrid fuzzy convolution-al neural network based mechanism for photovoltaic cell defect detection with electroluminescence images. IEEE Trans. Parallel Distrib. Syst. 32(7), 1653–1664 (2021). https://doi.org/10.1109/TPDS.2020.3046018
4. Kim, Y., Sugawara, T., Homma, N., Aoki, T., Satoh, A.: Biasing power traces to improve correlation power analysis attacks. In: First International Workshop on Constructive Side Channel Analysis and Secure Design (COSADE 2010), pp. 77–80 (2010)
5. Lecture Notes in Computer Science;Y Kim,2014
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献