Author of the publication

A Clustering K-Anonymity Scheme for Location Privacy Preservation.

, , , , , and . IEICE Trans. Inf. Syst., 95-D (1): 134-142 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

i-m-Space: interactive multimedia-enhanced space for rehabilitation of breast cancer patients., , , , , , , , , and 9 other author(s). ACM Multimedia, page 623-626. ACM, (2010)Detection of Cache Pollution Attack Based on Ensemble Learning in ICN-Based VANET., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3287-3298 (July 2023)Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (6): 2848-2860 (2021)Exploiting rich features for Chinese named entity recognition., , , and . ISKE, page 278-282. IEEE, (2010)Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set., , , , and . IMIS, page 213-220. IEEE Computer Society, (2015)A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor Network., , , , and . IMIS, page 94-100. IEEE Computer Society, (2015)HD-tDCS Applied on DLPFC Cortex for Sustained Attention Enhancement: A Preliminary EEG Study., , and . ICIRA (2), volume 13456 of Lecture Notes in Computer Science, page 656-665. Springer, (2022)Towards Enhancing Motor Imagery Based Brain-Computer Interface Performance by Integrating Speed of Imagined Movement., , , , and . ICIRA (1), volume 8917 of Lecture Notes in Computer Science, page 234-241. Springer, (2014)Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature., , , , , , , , and . ICDIS, page 134-141. IEEE, (2022)Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings., , , , , and . NLPCC (1), volume 14302 of Lecture Notes in Computer Science, page 184-196. Springer, (2023)