Author of the publication

Privacy Protection for Location Sharing Services in Social Networks.

, , , , and . MLICOM (1), volume 226 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 97-102. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service quality evaluation and service improvement using online reviews: A framework combining deep learning with a hierarchical service quality model., and . Electron. Commer. Res. Appl., (2022)Comparative Analysis of Five Local Search Operators on Visiting Constrained Multiple Traveling Salesmen Problem., , , , , and . SSCI, page 1-8. IEEE, (2021)Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint., and . IEEE/ACM Trans. Netw., 20 (2): 501-514 (2012)On role study of glycosylated hemoglobin in diagnosis and treatment monitoring of diabetes mellitus., , , , and . BMEI, page 422-425. IEEE, (2011)Modeling of Population Density Based on GIS and RS., , , and . IGARSS, page 1431-1434. IEEE, (2006)Learning-aided scheduling for mobile virtual network operators with QoS constraints., , , and . WiOpt, page 123-130. IEEE, (2016)Design on Early Warning System of CO2 Sequestration Leakage Based on Web GIS and WSN., , , and . GRMSE (2), volume 399 of Communications in Computer and Information Science, page 407-413. Springer, (2013)Social images tag ranking based on visual words in compressed domain., , , and . Neurocomputing, (2015)Chinese maximal noun phrase parsing based on cascaded conditional random fields., , , and . NLPKE, page 1-7. IEEE, (2009)Resilient burst ring: extend IEEE 802.17 to WDM networks., , and . IEEE Communications Magazine, 46 (11): 74-81 (2008)