您当前的位置:
首页 >
文章列表页 >
Privacy-utility tradeoff method using multi-variable source coding
privacy protection | 更新时间:2024-06-05
    • Privacy-utility tradeoff method using multi-variable source coding

    • Journal on Communications   Vol. 36, Issue 12, Pages: 172-177(2015)
    • DOI:10.11959/j.issn.1000-436x.2015326    

      CLC: TP309
    • Online First:2015-12

      Published:25 December 2015

    移动端阅览

  • Yong-hao GU, Jiu-chuan LIN. Privacy-utility tradeoff method using multi-variable source coding[J]. Journal on Communications, 2015, 36(12): 172-177. DOI: 10.11959/j.issn.1000-436x.2015326.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

973

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Lightweight authentication key agreement protocol for Internet of vehicles
Edge computing privacy protection method based on blockchain and federated learning
Traffic characteristic based privacy leakage assessment scheme for Android device
Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE
Image privacy preservation scheme based on QR code and reversible visible watermarking

Related Author

ZHOU Yi
LIU Yali
PANG Xiaohui
CHEN Dongdong
WANG Pengchao
Yangyang HU
Han ZHANG
Jiali MA

Related Institution

School of Cyber Science and Engineering, Southeast University
College of Computer Science and Technology, Jiangsu Normal University
State Key Laboratory for Novel Software Technology, Nanjing University
Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology
University of California, Riverside, Riverside 21
0