| Publication | Date of Publication | Type |
|---|
| FLSwitch: towards secure and fast model aggregation for federated deep learning with a learning state-aware switch | 2023-11-09 | Paper |
Quantitative analysis on the phase margin of ADRC Control Theory and Technology | 2023-06-20 | Paper |
Privacy-preserving queries on encrypted data Computer Security – ESORICS 2006 | 2022-03-09 | Paper |
| Correlation filter based visual tracking integrating saliency and motion cues | 2021-12-17 | Paper |
| scientific article; zbMATH DE number 7366427 (Why is no real title available?) | 2021-07-01 | Paper |
An efficient sample size adaptation strategy with adjustment of randomization ratio Biometrical Journal | 2020-01-15 | Paper |
| A Parameter Formula Connecting PID and ADRC | 2019-10-31 | Paper |
Analysis of combinatorial gene regulation with thermodynamic models Frontiers in Computational and Systems Biology | 2017-09-21 | Paper |
FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks IEEE Transactions on Computers | 2017-07-27 | Paper |
On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains IEEE Transactions on Computers | 2017-07-12 | Paper |
Toward Wireless Security without Computational Assumptions—Oblivious Transfer Based on Wireless Channel Characteristics IEEE Transactions on Computers | 2017-06-20 | Paper |
| Temporal difference learning with incremental nearest neighbors in continuous spaces | 2015-06-29 | Paper |
Image encryption scheme based on balanced two-dimensional cellular automata Mathematical Problems in Engineering | 2014-11-24 | Paper |
| An ant colony algorithm for solving a continuous function optimization problem based on pheromone distributive functions | 2014-02-28 | Paper |
An efficient solution to generalized Yao's millionaires problem Bulletin of the Belgian Mathematical Society - Simon Stevin | 2013-10-21 | Paper |
Optimal control channel selection for wireless channel assignment Mathematical Problems in Engineering | 2013-06-11 | Paper |
Approximation algorithm for estimating failure probability of multipath transmission Mathematics and Computers in Simulation | 2011-07-20 | Paper |
Privacy-preserving distributed algorithm for sparse vector sum Bulletin of the Belgian Mathematical Society - Simon Stevin | 2010-07-13 | Paper |
Identity-based mix: Anonymous communications without public key certificates Computers and Electrical Engineering | 2009-10-15 | Paper |
An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol Cryptologia | 2009-10-12 | Paper |
\(k\)-anonymous data collection Information Sciences | 2009-10-01 | Paper |
| On distributed \(k\)-anonymization | 2009-08-03 | Paper |
Simple zero-knowledge proof of knowing \(\sqrt{X_1}\) or \(\sqrt{X_2}\) mod \(N\) Bulletin of the Belgian Mathematical Society - Simon Stevin | 2009-04-02 | Paper |
Efficient, anonymous, and authenticated conference Key setup in cellular wireless networks Computers and Electrical Engineering | 2008-08-15 | Paper |
| An algorithm for matching problems of multi-partite graphs which include one cycle | 2008-06-03 | Paper |
An efficient approximation algorithm for counting \(n\)-cycles in a graph Applied Mathematics and Computation | 2008-03-06 | Paper |
Towards a theory of data entanglement Theoretical Computer Science | 2008-01-07 | Paper |
Two methods for privacy preserving data mining with malicious participants Information Sciences | 2007-10-18 | Paper |
| scientific article; zbMATH DE number 5169291 (Why is no real title available?) | 2007-07-02 | Paper |
An efficient algorithm for topology discovery of a blackbox communication network Applied Mathematics and Computation | 2007-04-26 | Paper |
Privacy-preserving algorithms for distributed mining of frequent itemsets Information Sciences | 2007-02-16 | Paper |
| An efficient and secure cryptosystem for encrypting long messages | 2006-08-28 | Paper |
Optimistic Mixing for Exit-Polls Lecture Notes in Computer Science | 2003-07-16 | Paper |