Gang Sheng

Orcid: 0000-0001-7089-1302

According to our database1, Gang Sheng authored at least 17 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Diagnosis of Parkinson's disease based on feature fusion on T2 MRI images.
Int. J. Intell. Syst., December, 2022

A Laser-Based Multipass Absorption Sensor for Sub-ppm Detection of Methane, Acetylene and Ammonia.
Sensors, 2022

2021
Noniterative Sparse LS-SVM Based on Globally Representative Point Selection.
IEEE Trans. Neural Networks Learn. Syst., 2021

E-commerce process reengineering for customer privacy protection.
Int. J. Inf. Comput. Secur., 2021

2020
A Multi-Objective Emergency Rescue Facilities Location Model for Catastrophic Interlocking Chemical Accidents in Chemical Parks.
IEEE Trans. Intell. Transp. Syst., 2020

2019
Authentication of outsourced linear function query with efficient updates.
Clust. Comput., 2019

2017
Authentication of Outsourced Linear Function Query with Efficient Updates.
IACR Cryptol. ePrint Arch., 2017

2016
MD-<i>VC</i><sub>Matrix</sub>: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication.
Proceedings of the Network and System Security - 10th International Conference, 2016

Correctness Verification of Outsourced Inner Product of Vectors with Error Localization.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

2015
An Efficient and Impartial Buyer-Seller Watermarking Protocol.
J. Commun., 2015

Finding Top-k Covering Irreducible Contrast Sequence Rules for Disease Diagnosis.
Comput. Math. Methods Medicine, 2015

2014
Query Integrity Verification based-on MAC Chain in Cloud Storage.
Int. J. Networked Distributed Comput., 2014

Privacy Preserving Inner Product of Vectors in Cloud Computing.
Int. J. Distributed Sens. Networks, 2014

Query integrity verification based-on MAC chain in cloud storage.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

2013
A Superlinearly Convergent Method for the Generalized Complementarity Problem over a Polyhedral Cone.
J. Appl. Math., 2013

Verifying correctness of inner product of vectors in cloud computing.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

An Active Service Reselection Triggering Mechanism.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013


  Loading...