Author of the publication

Achieving Effective $k$ -Anonymity for Query Privacy in Location-Based Services.

, , , , , and . IEEE Access, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

p-Percent Coverage in Wireless Sensor Networks., , , and . WASA, volume 5258 of Lecture Notes in Computer Science, page 200-211. Springer, (2008)Task Allocation Model Based on Worker Friend Relationship for Mobile Crowdsourcing., , , , and . Sensors, 19 (4): 921 (2019)A Survey on Privacy Issues in Mobile Social Networks., and . IEEE Access, (2020)Differential Privacy Preserving Genomic Data Releasing via Factor Graph., , and . ISBRA, volume 10330 of Lecture Notes in Computer Science, page 350-355. Springer, (2017)Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform., , , and . Blockchain, page 26-33. IEEE, (2019)A Dominating Set Based Approach to Identify Effective Leader Group of Social Network., , , , and . COCOON, volume 7936 of Lecture Notes in Computer Science, page 841-848. Springer, (2013)Statistical evaluation of NMR backbone resonance assignment., , , and . Int. J. Bioinform. Res. Appl., 2 (2): 147-160 (2006)Influence maximization by probing partial communities in dynamic online social networks., , , , , and . Trans. Emerg. Telecommun. Technol., (2017)A Resilient and Scalable Flocking Scheme in Autonomous Vehicular Networks., , , , , and . Mob. Networks Appl., 15 (1): 126-136 (2010)An energy efficient privacy-preserving content sharing scheme in mobile social networks., , , , , and . Pers. Ubiquitous Comput., 20 (5): 833-846 (2016)