Author of the publication

移动商务推荐系统中的一种基于P2P的隐私保护策略 (P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System).

, , , and . 计算机科学, 44 (9): 178-183 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algebra model and security analysis for cryptographic protocols., and . Sci. China Ser. F Inf. Sci., 47 (2): 199-220 (2004)Optimizing Dynamic Cache Allocation in Vehicular Edge Networks: A Method Combining Multisource Data Prediction and Deep Reinforcement Learning., , and . IEEE Internet Things J., 11 (6): 9955-9968 (March 2024)Robust Tracking via Uncertainty-Aware Semantic Consistency., , , , , , and . IEEE Trans. Circuits Syst. Video Technol., 33 (4): 1740-1751 (April 2023)Differentially private frequent episode mining over event streams., , , , , and . Eng. Appl. Artif. Intell., (2022)Dynamic Social Recommendation with High-Matching Inhomogeneous Relations., , , , , and . SMC, page 526-533. IEEE, (2023)SCPS: A Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric., , , , , and . CBD, page 224-229. IEEE, (2021)Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method., , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 1073-1080. Springer, (2005)Privacy-Preserving Trajectory Publication against Parking Point Attacks., , , and . UIC/ATC, page 569-574. IEEE Computer Society, (2013)Distributed Access Control in CROWN Groups., , , and . ICPP, page 435-442. IEEE Computer Society, (2005)A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data., , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 460-473. Springer, (2016)