Zihao Shan
Títol
Citada per
Citada per
Any
Practical Secure Computation Outsourcing: A Survey
Z Shan, K Ren, M Blanton, C Wang
ACM Computing Surveys (CSUR) 51 (2), 31, 2018
382018
You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center
LY Zhang, Y Zheng, J Weng, C Wang, Z Shan, K Ren
IEEE Transactions on Dependable and Secure Computing, 2018
92018
SecSAKE: Towards secure and efficient outsourcing of clinical MRI reconstruction
Z Shan, Z Qin, L Ying, K Ren
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
22018
A unified framework of source camera identification based on features
B Wang, K Zhong, Z Shan, MN Zhu, X Sui
Forensic science international 307, 110109, 2020
2020
Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction
Z Shan, K Ren, Z Qin
2017 IEEE Symposium on Privacy-Aware Computing (PAC), 204-205, 2017
2017
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–5