Author of the publication

Protection of location privacy in continuous LBSs against adversaries with background information.

, , , , and . ICNC, page 1-6. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Three-dimensional reconstruction of objects buried in layered media using Born and distorted Born iterative methods., , and . IEEE Geosci. Remote. Sens. Lett., 1 (2): 107-111 (2004)Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies., , , , , , and . IEEE Internet Things J., 6 (2): 1471-1483 (2019)Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario., , and . IEEE Access, (2019)Server-aided private set intersection based on reputation., , , and . Inf. Sci., (2017)Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach., , , , , and . Concurr. Comput. Pract. Exp., (2023)A Searchable CP-ABE Privacy Preserving Scheme., , , , and . Int. J. Netw. Secur., 21 (4): 680-689 (2019)Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks., , , and . Ad Hoc Sens. Wirel. Networks, 10 (2-3): 235-251 (2010)A Framework for Personalized Location Privacy., , , , , and . IEEE Trans. Mob. Comput., 21 (9): 3071-3083 (2022)Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks., , , , , and . IEEE Trans. Mob. Comput., 21 (1): 125-138 (2022)Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing., , , and . KSII Trans. Internet Inf. Syst., 9 (7): 2719-2735 (2015)