您当前的位置:
首页 >
文章列表页 >
Efficient scheme for user's trajectory privacy
privacy protection | 更新时间:2024-06-05
    • Efficient scheme for user's trajectory privacy

    • Journal on Communications   Vol. 36, Issue 12, Pages: 114-123(2015)
    • DOI:10.11959/j.issn.1000-436x.2015320    

      CLC: TN 929.5
    • Online First:2015-12

      Published:25 December 2015

    移动端阅览

  • Feng-hua LI, Cui ZHANG, Ben NIU, et al. Efficient scheme for user's trajectory privacy[J]. Journal on Communications, 2015, 36(12): 114-123. DOI: 10.11959/j.issn.1000-436x.2015320.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1914

下载量

12

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Trajectory differential privacy protection mechanism based on prediction and sliding window
Statistics release and privacy protection method of location big data based on deep learning
Trajectory privacy protection scheme based on differential privacy
Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means
Privacy self-correlation privacy-preserving scheme in LBS

Related Author

Ayong YE
Lingyu MENG
Ziwen ZHAO
Yiqing DIAO
Jiaomei ZHANG
Yiming CONG
Yan YAN
Mahmood Adnan

Related Institution

College of Mathematics and Informatics, Fujian Normal University
Fujian Provincial Key Laboratory of Network Security and Cryptology
Faculty of Science and Engineering, Macquarie University
School of Computer and Communication, Lanzhou University of Technology
School of Computer Science and Engineering, Nanjing University of Science and Technology
0