k-Anonymity Location Privacy Algorithm Based on Clustering
暂无分享,去创建一个
Fan Yang | Xiao Pan | Lijuan Zheng | Mei Wu | Zhaoxuan Li | Huanhuan Yue | Xiao Pan | Zhaoxuan Li | Lijuan Zheng | Huanhuan Yue | Mei Wu | Fan Yang
[1] Marco Gruteser,et al. USENIX Association , 1992 .
[2] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Sean Hughes,et al. Clustering by Fast Search and Find of Density Peaks , 2016 .
[4] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[5] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[6] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[7] Jin Li,et al. Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks , 2017, IEEE Systems Journal.
[8] Jong Kim,et al. Location Privacy via Differential Private Perturbation of Cloaking Area , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[9] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[10] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[11] G. Lakpathi,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .
[12] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[13] Rui Xu,et al. Survey of clustering algorithms , 2005, IEEE Transactions on Neural Networks.
[14] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[15] Hua Lu,et al. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[16] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.