Author of the publication

Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services.

, , , and . J. Circuits Syst. Comput., 26 (7): 1750119:1-1750119:25 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Accuracy DOA Estimation based on Vectorized Fourth-Order Cumulant with Coprime Array., , , , , and . ICCT, page 210-215. IEEE, (2019)A Particle Swarm Optimization Clustering-Based Attribute Generalization Privacy Protection Scheme., , , and . J. Circuits Syst. Comput., 27 (11): 1850179:1-1850179:21 (2018)Towards Region Queries with Strong Location Privacy in Mobile Network., and . Mob. Inf. Syst., (2021)PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication., , , , , , and . CCS, page 1901-1915. ACM, (2022)A Location Privacy Preserving Method Based on Sensitive Diversity for LBS., , , , and . NPC, volume 8707 of Lecture Notes in Computer Science, page 409-422. Springer, (2014)A Methodology for Calculating Greenhouse Effect of Aircraft Cruise Using Genetic Algorithm-Optimized Wavelet Neural Network., , , and . Complex., (2020)1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing., , , , , , , and . ISSTA, page 867-879. ACM, (2023)An Improved Fine-Grained Encryption Method for Unstructured Big Data., , and . ICYCSEE, volume 503 of Communications in Computer and Information Science, page 361-369. Springer, (2015)A novel attributes anonymity scheme in continuous query., , , , and . Wirel. Pers. Commun., 101 (2): 943-961 (2018)Privacy Preserving in Cloud Environment for Obstructed Shortest Path Query., , , and . Wirel. Pers. Commun., 96 (2): 2305-2322 (2017)