Author of the publication

PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS.

, , , , , and . IEEE Trans. Knowl. Data Eng., 36 (2): 781-794 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET., , , , and . IEEE Trans. Veh. Technol., 69 (2): 2034-2048 (2020)Improvement of robust smart-card-based password authentication scheme., , , and . Int. J. Commun. Syst., 28 (2): 383-393 (2015)Region-by-Region Registration Combining Feature-Based and Optical Flow Methods for Remote Sensing Images., , , and . Remote. Sens., 13 (8): 1475 (2021)Generating High-Quality and High-Resolution Seamless Satellite Imagery for Large-Scale Urban Regions., , , , , , and . Remote. Sens., 12 (1): 81 (2020)MID: A Novel Mountainous Remote Sensing Imagery Registration Dataset Assessed by a Coarse-to-Fine Unsupervised Cascading Network., , , and . Remote. Sens., 14 (17): 4178 (2022)Formal Characterization of Malicious Code in Power Information Systems Based on Multidimensional Feature Fusion., , , , and . ICCSIE, page 274-281. ACM, (2023)Intelligent Detection Method for Froth Flotation Based on YOLOv5., , , and . IEEE Access, (2022)Network security situation prediction based on feature separation and dual attention mechanism., , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 177 (2021)A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication., , , , and . IEEE Access, (2018)RESAT: A Utility-Aware Incentive Mechanism-Based Distributed Spatial Cloaking., , , , , , and . IEEE Internet Things J., 9 (22): 23201-23214 (2022)