Author of the publication

A privacy-preserving location tracking system for smartphones based on cloud storage.

, , , , and . Secur. Commun. Networks, 8 (3): 446-458 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Answering exact distance queries on real-world graphs with bounded performance guarantees.. VLDB J., 23 (5): 677-695 (2014)A Chinese question answering system based on web search., , , , and . ICMLC, page 816-820. IEEE, (2014)Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , and . CoRR, (2018)Speech Enhancement via Generative Adversarial LSTM Networks., and . IWAENC, page 46-50. IEEE, (2018)Twitter spam detection based on deep learning., , , and . ACSW, page 3:1-3:8. ACM, (2017)Predicting prognostic markers for glioma using gene co-expression network analysis., , and . BCB, page 546-551. ACM, (2010)Cartesian contour: a concise representation for a collection of frequent sets., , and . KDD, page 417-426. ACM, (2009)Additive Spanners for Circle Graphs and Polygonal Graphs., , , and . WG, volume 5344 of Lecture Notes in Computer Science, page 110-121. (2008)An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection., , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 215-228. Springer, (2016)Research on Fuzzy Control Methods for Suspension Density and Liquid Levels in Dense-Medium Separation.. ISNN (2), volume 5552 of Lecture Notes in Computer Science, page 35-42. Springer, (2009)