您当前的位置:
首页 >
文章列表页 >
Privacy-preserving trajectory similarity computation method
Papers | 更新时间:2024-06-05
    • Privacy-preserving trajectory similarity computation method

    • Journal on Communications   Vol. 43, Issue 11, Pages: 1-13(2022)
    • DOI:10.11959/j.issn.1000-436x.2022223    

      CLC: TP39
    • Online First:2022-11

      Published:25 November 2022

    移动端阅览

  • Haining YU, Hongli ZHANG, Xiangzhan YU, et al. Privacy-preserving trajectory similarity computation method[J]. Journal on Communications, 2022, 43(11): 1-13. DOI: 10.11959/j.issn.1000-436x.2022223.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

937

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Survey of research on efficient secure inference for deep learning
Privacy-preserving convolutional neural network inference scheme based on homomorphic ciphertext transformation
Efficient secure federated learning aggregation framework based on homomorphic encryption
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
K-Means clustering outsourcing scheme based on sparse matrix transformation and bounded random perturbation

Related Author

HU Peng
SUN Lei
HU Cuiyun
GUO Song
WANG Jingwen
WANG Zhihong
YAO Jingyi
LI Ruiqi

Related Institution

Department of Cryptogram Engineering, Information Engineering University
Troops of PLA
Henan Key Laboratory of Information Security
College of Safety Science and Technology and Engineering, Civil Aviation University of China
College of Cyber Science, Nankai University
0