[1] |
LYU Xin, ZHAO Liancheng, YU Jiyuan, TAN Bin, ZENG Tao, CHEN Juan.
Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS
[J]. Computer Engineering and Applications, 2021, 57(2): 104-112.
|
[2] |
HOU Yao, TAO Yang, YANG Li, XIONG Lian.
Personal Trajectory Information Protection Based on Differential Privacy Mechanism
[J]. Computer Engineering and Applications, 2020, 56(9): 106-110.
|
[3] |
SONG Guochao, CHU Guanghui, WU Shaoxin.
Location Privacy Protection Approach Based on Interval Region
[J]. Computer Engineering and Applications, 2020, 56(8): 66-73.
|
[4] |
ZENG Haiyan, ZUO Kaizhong, WANG Yonglu, LIU Rui.
Semantic Diversity Location Privacy Protection Method in Road Network Environment
[J]. Computer Engineering and Applications, 2020, 56(7): 102-108.
|
[5] |
SONG Xuewen, LV Xin, WANG Xinyuan.
Grid-Based Location Privacy Protection Method in Hybrid Architecture
[J]. Computer Engineering and Applications, 2019, 55(23): 92-98.
|
[6] |
XING Kai1,2, LUO Yonglong1,2, NING Xueli1,2, ZHENG Xiaoyao1,2.
Location Privacy Protection Algorithm Based on Geohash Encoding
[J]. Computer Engineering and Applications, 2019, 55(1): 96-102.
|
[7] |
SUN Dandan1,2, LUO Yonglong1,2, FAN Guoting1,2, GUO Liangmin1,2, ZHENG Xiaoyao1,2.
Location privacy-preserving method against attacks under P2P communication
[J]. Computer Engineering and Applications, 2018, 54(9): 75-83.
|
[8] |
MA Wei, SONG Ling.
Source location privacy preservation routing protocol based on multi-path
[J]. Computer Engineering and Applications, 2018, 54(16): 81-85.
|
[9] |
ZHANG Yanan, XU Yong, WU Xujing.
Enhanced source-location privacy preservation protocol using random angle
[J]. Computer Engineering and Applications, 2016, 52(15): 119-125.
|
[10] |
HU Jianpeng, CHEN Qiang, HUANG Rong.
Study on variable optimization method in stepwise Bayes discriminant analysis
[J]. Computer Engineering and Applications, 2014, 50(21): 63-67.
|
[11] |
MA Zong-da1,LAN Yu-qing1,GUO Shu-hang2.
Recognition method of remarkable reuse influential factors about software engineering knowledge
[J]. Computer Engineering and Applications, 2009, 45(5): 78-81.
|
[12] |
ZENG Ying-lan,ZHENG Jin-hua,LUO Biao.
Increase diversity of solutions of MOEAs—∞-norm based stepwise method
[J]. Computer Engineering and Applications, 2009, 45(10): 49-53.
|
[13] |
ZHANG Wei,TAO Zhi-rong.
Research on Key Value Renewal Random Hash Lock-based RFID privacy enhancement
[J]. Computer Engineering and Applications, 2008, 44(32): 126-128.
|
[14] |
LIU Gui1,YU Wei-dong1,2.
Roving craft parameters’ correlation analysis and BP network forecast discussion
[J]. Computer Engineering and Applications, 2008, 44(28): 233-235.
|
[15] |
WU Bo,HU Xiao-long.
Strategy of protecting source-location privacy in WSN based on fake paths
[J]. Computer Engineering and Applications, 2008, 44(16): 114-117.
|