Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication., , , and . Frontiers Comput. Sci., 16 (4): 164816 (2022)A multi-scale graph embedding method via multiple corpora., , and . Neurocomputing, (July 2023)Resource allocation for MEC system with multi-users resource competition based on deep reinforcement learning approach., , , , , and . Comput. Networks, (2022)A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network., , , , , and . ICC, page 1-7. IEEE, (2020)A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data., and . Int. J. Softw. Eng. Knowl. Eng., 24 (7): 1091- (2014)Local differential privacy for social network publishing., , , , , , and . Neurocomputing, (2020)社会网络分析软件研究 (Study of Social Network Analysis Software)., , and . 计算机科学, 42 (12): 171-174 (2015)A Hybrid Optimization Approach for Anonymizing Transactional Data., and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 120-132. Springer, (2015)A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing., , , , and . MSPN, volume 11005 of Lecture Notes in Computer Science, page 224-239. Springer, (2018)A Data Middleware for Obtaining Trusted Price Data for Blockchain., , , , , and . CoRR, (2023)