CORC

浏览/检索结果: 共19条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
epsilon-k anonymization and adversarial training of graph neural networks for privacy preservation in social networks 期刊论文
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2021, 卷号: 50, 页码: 17
作者:  Tian, Hu;  Zheng, Xiaolong;  Zhang, Xingwei;  Zeng, Daniel Dajun
收藏  |  浏览/下载:38/0  |  提交时间:2021/12/28
A weighted K-member clustering algorithm for K-anonymization 期刊论文
COMPUTING, 2021, 卷号: 103, 期号: 10, 页码: -
作者:  Yan, Yan;  Herman, Eyeleko Anselme;  Mahmood, Adnan;  Feng, Tao;  Xie, Pengshou
收藏  |  浏览/下载:13/0  |  提交时间:2021/03/12
Efficient location privacy algorithm for Internet of Things (IoT) services and applications 期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 卷号: 89, 页码: 3-13
作者:  Sun, Gang;  Chang, Victor;  Ramachandran, Muthu;  Sun, Zhili;  Li, Gangmin
收藏  |  浏览/下载:3/0  |  提交时间:2019/11/26
Personalized extended (alpha, k)-anonymity model for privacy-preserving data publishing 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 卷号: Vol.29 No.6
作者:  Liu,Xiangwen;  Wang,Liangmin;  Xie,Qingqing
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/22
ROAT: Road-network-based Anonymization of Trajectories 会议论文
13th IEEE Int Conf on Ubiquitous Intelligence and Comp/13th IEEE Int Conf on Adv and Trusted Comp/16th IEEE Int Conf on Scalable Comp and Commun/IEEE Int Conf on Cloud and Big Data Comp/IEEE Int Conf on Internet of People/IEEE Smart World Congre, Toulouse, FRANCE, 2016-07-18
作者:  Sui, Peipei;  Li, Xianxian
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services 其他
2014-01-01
Wu, Zhengang; Yu, Liangwen; Sun, Huiping; Guan, Zhi; Chen, Zhong
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/16
Provider Aware Anonymization Algorithm for Preserving M - Privacy 期刊论文
International Journal of Engineering Research and Applications, 2014, 卷号: Vol.4 No.7, 页码: 1-12
作者:  M.K.Nageswari;  A.UshaRani
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/30
Privacy Preservation by k-anonymizing Ngrams of Time series 会议论文
10th International ISC Conference on Information Security and Cryptology (ISCISC), Yazd Univ, Yazd, IRAN, 2013-08-29
作者:  Zare-Mirakabad, Mohammad-Reza;  Kaveh-Yazdy, Fatemeh;  Tahmasebi, Mohammad
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Nibble: An effective k-anonymization 会议论文
2011 International Conference on Mechatronic Science, Electric Engineering and Computer, MEC 2011, 2011-08-19
作者:  He, Lei[1];  Yu, Songnian[2]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/30
基于R树多维K-匿名算法 期刊论文
2010, 2010
邓京璟; 叶晓俊; DENG Jing-jing; YE Xiao-jun
收藏  |  浏览/下载:2/0


©版权所有 ©2017 CSpace - Powered by CSpace