Author of the publication

LocLok: Location Cloaking with Differential Privacy via Hidden Markov Model.

, , , and . Proc. VLDB Endow., 10 (12): 1901-1904 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A case study on social network in a computer game., , , and . AAMAS, page 954-955. ACM, (2003)BEAS: Bounded Evaluation of SQL Queries., , , , , and . SIGMOD Conference, page 1667-1670. ACM, (2017)An Effective Syntax for Bounded Relational Queries., and . SIGMOD Conference, page 599-614. ACM, (2016)Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs., , and . CSAI/ICIMT, page 468-473. ACM, (2018)Sequential Change-Point Detection via Online Convex Optimization., , , and . Entropy, 20 (2): 108 (2018)Automatic Removal of Artifacts from EEG Data Using ICA and Exponential Analysis., , , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 719-726. Springer, (2006)Power Estimation of CMOS Circuits by Neural Network Macromodel., , , and . ISNN (2), volume 3973 of Lecture Notes in Computer Science, page 1313-1318. Springer, (2006)Object-Oriented Network: A Named-Data Architecture Toward the Future Internet., , , and . IEEE Internet of Things Journal, 4 (4): 957-967 (2017)Stochastic Simulation Algorithms for Chemical Reactions., , and . BIOCOMP, page 431-436. CSREA Press, (2008)A "Resource Package"-Oriented Approach for Remote Sensing Analysis Modeling - Dust Storm Monitoring Model as Example., , , and . International Journal of Software Engineering and Knowledge Engineering, 24 (5): 731-758 (2014)