Author of the publication

A personalized two-tier cloaking scheme for privacy-aware location-based services.

, , , , , and . ICNC, page 94-98. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of a Lightweight Single-Band Bathymetric LiDAR., , , , , , , , , and 11 other author(s). Remote. Sens., 14 (22): 5880 (2022)Firefly Algorithm-Based Semi-Supervised Learning With Transformer Method for Shore Power Load Forecasting., , , , , , , and . IEEE Access, (2023)Containment Tracking for Networked Agents Subject to Nonuniform Communication Delays., , , , and . IEEE Trans. Netw. Sci. Eng., 10 (6): 3658-3669 (November 2023)A New Deep Learning Framework for HF Signal Detection in Wideband Spectrogram., , , and . IEEE Signal Process. Lett., (2022)Image co-segmentation based on pyramid features cross-correlation network., , , , , and . Sci. China Inf. Sci., (January 2023)Prompt Decoupling for Text-to-Image Person Re-identification., , , and . CoRR, (2024)Privacy Preservation Strategy in Time-Sensitive LBSs., , and . DSC, page 488-493. IEEE Computer Society, (2017)An EHGO-based Robust Control for Multi-agent Consensus With Unmeasured Velocity and Disturbances., , , , , and . CRC, page 78-83. IEEE, (2022)Towards Open-Set Object Detection and Discovery., , , , and . CVPR Workshops, page 3960-3969. IEEE, (2022)Blind Image Decomposition., , , , , , , and . ECCV (18), volume 13678 of Lecture Notes in Computer Science, page 218-237. Springer, (2022)