Author of the publication

Protection of location privacy in continuous LBSs against adversaries with background information.

, , , , and . ICNC, page 1-6. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CHASSIS: Conformity Meets Online Information Diffusion., , and . SIGMOD Conference, page 1829-1840. ACM, (2020)BRUNCH: Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media., , and . PAKDD (1), volume 12084 of Lecture Notes in Computer Science, page 553-566. Springer, (2020)Predicting Aging-Genes in Drosophila Melanogaster by Integrating Network Topological Features and Functional Categories., , , , and . IJKDB, 3 (2): 16-26 (2012)Discovering Aging-Genes by Topological Features in Drosophila melanogaster Protein-Protein Interaction Network., , , , and . ICDM Workshops, page 94-98. IEEE Computer Society, (2012)Study of repeated e-government project audit based on text mining., , and . Int. J. Inf. Technol. Manag., 16 (4): 391-404 (2017)Semi-supervised imputation for microarray missing value estimation., , and . BIBM, page 297-300. IEEE Computer Society, (2014)Quantum Strategy Without Entanglement, , , , , and . (November 2000)Privacy Preserving Data-Sharing Scheme in Content-Centric Networks Against Collusion Name Guessing Attacks., and . IEEE Access, (2017)Secure k Nearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments., , , , and . IEEE Trans. Big Data, 4 (4): 586-599 (2018)A New Design of Binary MDS Array Codes with Asymptotically Weak-Optimal Repair., , , , and . CoRR, (2018)