Author of the publication

Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party.

, , , , , and . Secur. Commun. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments and Further Results on 'Performance Evaluation of a New BPSK-OFDM Timing Estimation Algorithm'., , , and . Wireless Personal Communications, 49 (2): 149-159 (2009)认知无线电中能效优化的子载波匹配策略 (Subcarrier Pairing Strategy for Energy Efficiency Optimization in Cognitive Radio)., , , , and . 计算机科学, 44 (6): 108-113 (2017)Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel., , and . IEEE Trans. Inf. Forensics Secur., (2021)Joint resource optimization for DF relaying SWIPT based cognitive sensor networks., , , , , and . Phys. Commun., (2018)EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching., , , and . J. Comput. Syst. Sci., 82 (1): 156-172 (2016)Enhanced image compression method exploiting NTT for internet of thing., , , , , and . Int. J. Circuit Theory Appl., 51 (4): 1879-1892 (April 2023)Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation., and . SAC, page 1470-1477. ACM, (2012)Rateless coded Orthogonal Frequency Division Multiplexing system design based on intercarrier interference self-cancelation., , , , and . Int. J. Commun. Syst., (2020)Wireless localization based on the time sum of arrival and Taylor expansion., , , , and . ICON, page 1-4. IEEE, (2013)Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising., , and . ICDCS, page 298-307. IEEE Computer Society, (2015)