Author of the publication

A personalized two-tier cloaking scheme for privacy-aware location-based services.

, , , , , and . ICNC, page 94-98. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust H∞ control for a class of uncertain nonlinear switched systems with average dwell time., and . Int. J. Control, 86 (6): 1107-1117 (2013)A lifecycle model for simulating bacterial evolution., , , , and . Neurocomputing, 72 (1-3): 142-148 (2008)Hybrid learning particle swarm optimizer with genetic disturbance., , and . Neurocomputing, (2015)Achieving Lightweight and Secure Access Control in Multi-authority Cloud., , , , and . TrustCom/BigDataSE/ISPA (1), page 459-466. IEEE, (2015)A Hybrid Evolutionary System for Designing Artifical Neural Networks., and . CSSE (4), page 859-862. IEEE Computer Society, (2008)978-0-7695-3336-0.Hunting abnormal configurations for permission-sensitive role mining., , , , and . MILCOM, page 1004-1009. IEEE, (2016)Server-aided private set intersection based on reputation., , , and . Inf. Sci., (2017)The Design of Blue Emitting Materials Based on Spirosilabifluorene Derivatives., , and . International Conference on Computational Science (2), volume 4488 of Lecture Notes in Computer Science, page 319-326. Springer, (2007)Hydrologic Cycle Optimization Part II: Experiments and Real-World Application., , and . ICSI (1), volume 10941 of Lecture Notes in Computer Science, page 350-358. Springer, (2018)An Improved Image Rectification Algorithm Based on Particle Swarm Optimization., , , and . ICIC (1), volume 6215 of Lecture Notes in Computer Science, page 587-594. Springer, (2010)