Author of the publication

A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments.

, , , and . TrustCom, page 943-948. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT-interfaced solid-contact ion-selective electrodes for cyber-monitoring of element- specific nutrient information in hydroponics., , , , , , , , , and 1 other author(s). Comput. Electron. Agric., (November 2023)The analysis of user behavior and relationship on Bulletin Board System., , , , and . TAAI, page 381-387. IEEE, (2015)Exponential Stability of Nonmonotone Traveling Waves for Nicholson's Blowflies Equation., , , and . SIAM J. Math. Anal., 46 (2): 1053-1084 (2014)VLSI Implementation of RISC MCU with In-Circuit Debugger., , , , , , and . ICKII, page 63-68. IEEE, (2022)Prolonging lifetime for wireless rechargeable sensor networks through sleeping and charging scheduling., , , , and . Int. J. Commun. Syst., (2020)Matched Filters for Bin Picking., , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 6 (6): 686-697 (1984)Maximizing Charging Efficiency With Fresnel Zones., , , , , , and . IEEE Trans. Mob. Comput., 23 (1): 612-629 (January 2024)TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks., , , , , and . IEEE Trans. Mob. Comput., 17 (1): 211-224 (2018)Protecting location privacy and query privacy: a combined clustering approach., , and . Concurr. Comput. Pract. Exp., 27 (12): 3021-3043 (2015)Near Optimal Charging Schedule for 3-D Wireless Rechargeable Sensor Networks., , , , , , , and . IEEE Trans. Mob. Comput., 22 (6): 3525-3540 (June 2023)