您当前的位置:
首页 >
文章列表页 >
Trajectory reconstruction attacks on differential privacy based on a CNN-BiLSTM-Attention hybrid model
Papers | 更新时间:2026-01-21
    • Trajectory reconstruction attacks on differential privacy based on a CNN-BiLSTM-Attention hybrid model

    • Journal on Communications   Vol. 46, Issue 12, Pages: 138-156(2025)
    • DOI:10.11959/j.issn.1000-436x.2025252    

      CLC: TP309.2
    • Received:19 August 2025

      Revised:2025-12-20

      Accepted:21 December 2025

      Published:25 December 2025

    移动端阅览

  • XIE Lixia,ZHAO Erkang,YANG Hongyu,et al.Trajectory reconstruction attacks on differential privacy based on a CNN-BiLSTM-Attention hybrid model[J].Journal on Communications,2025,46(12):138-156. DOI: 10.11959/j.issn.1000-436x.2025252.

  •  
  •  

0

Views

276

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Illicit data resale detection method via an enhanced relational graph convolutional network
Personalized trajectory privacy protection method based on fuzzy sensitivity quantification in MEC
Network traffic anomaly detection method based on multi-scale convolution and channel attention mechanism
Federated learning with differential privacy recalibration for dynamic computing nodes

Related Author

Wang Yuxiang
Zhang Lingcui
Hou Yuqiao
Yang Qian
Niu Ben
Jiang Zhongyuan
Fang Mengxin
Wang Qizhou

Related Institution

Institute of Information Engineering, Chinese Academy of Sciences
School of Cyber Security, University of Chinese Academy of Sciences
State Key Laboratory of Cyberspace Security Defense
School of Cyber Engineering, Xidian University
Purple Mountain Laboratories
0