[1] |
LIANG Xiaobing, XU Bin, ZHAI Feng, SHEN Bo.
Power Consumption Big Data Privacy Protection Method Based on Attribute Classification
[J]. Computer Engineering and Applications, 2020, 56(5): 93-100.
|
[2] |
ZHAN Jiacheng1, WANG Qiuhua2, OUYANG Xiaoqin1.
Source-Location Privacy Protection Routing Protocol in Wireless Sensor Networks by Avoiding Attackers
[J]. Computer Engineering and Applications, 2019, 55(12): 103-109.
|
[3] |
LI Dan, LING Jie.
Variable-length clustering-based approach for personalization anonymization protection
[J]. Computer Engineering and Applications, 2018, 54(8): 85-90.
|
[4] |
WANG Jin, ZHANG Yonghui, GU Xiang.
Trust-aware privacy-preserving scheme for VANET
[J]. Computer Engineering and Applications, 2018, 54(6): 62-67.
|
[5] |
MA Wei, SONG Ling.
Source location privacy preservation routing protocol based on multi-path
[J]. Computer Engineering and Applications, 2018, 54(16): 81-85.
|
[6] |
ZHANG Gang, SHI Runhua, ZHONG Hong.
Anonymous authentication scheme based on identity in VANET
[J]. Computer Engineering and Applications, 2016, 52(17): 101-106.
|
[7] |
ZHANG Yanan, XU Yong, WU Xujing.
Enhanced source-location privacy preservation protocol using random angle
[J]. Computer Engineering and Applications, 2016, 52(15): 119-125.
|
[8] |
GUO Xudong, WU Yingjie, YANG Wenjin, WANG Xiaodong.
l-diversity algorithm for privacy preserving trajectory data publishing
[J]. Computer Engineering and Applications, 2015, 51(2): 125-130.
|
[9] |
LIU Lijie1, LI Panchi2, LI Shouwei3.
Research of granulating(α, k)-anonymous method
[J]. Computer Engineering and Applications, 2014, 50(2): 75-80.
|
[10] |
WANG Pingshui1,2, WANG Jiandong1.
Personalized(l,c)-anonymity algorithm based on clustering
[J]. Computer Engineering and Applications, 2012, 48(23): 16-20.
|
[11] |
WANG Shenghe1, WANG Jiajun2, LIU Tengteng2, NI Weiwei2.
Privacy-preserving data publishing method for dataset with multi-dimensional sensitive attributes
[J]. Computer Engineering and Applications, 2012, 48(20): 136-141.
|
[12] |
WANG Yan1,2, LE Jiajin3, SUN Jie1, JIANG Jiulei1.
Privacy protection data mining method based on network user behavior
[J]. Computer Engineering and Applications, 2012, 48(13): 138-143.
|
[13] |
KAN Ying-ying1,CAO Tian-jie1,2.
Enhanced privacy preserving K-anonymity model:(α,L)-diversity K-anonymity
[J]. Computer Engineering and Applications, 2010, 46(21): 148-151.
|
[14] |
WANG Rui,LIU Jie.
Research of privacy preserving association rules mining algorithm
[J]. Computer Engineering and Applications, 2009, 45(26): 126-130.
|
[15] |
CEN Ting-ting1,HAN Jian-min1,2,WANG Ji-yi1,LI Xi-yu1.
Survey of K-anonymity research on privacy preservation
[J]. Computer Engineering and Applications, 2008, 44(4): 130-134.
|