Author of the publication

Improving Data Utility Through Game Theory in Personalized Differential Privacy.

, , , , , and . J. Comput. Sci. Technol., 34 (2): 272-286 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism., , , , , , and . CoRR, (2022)Bit Flipping Key Encapsulation for the Post-Quantum Era., , , and . IEEE Access, (2023)SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification., , , , and . GLOBECOM, page 1-6. IEEE, (2018)PASPORT: A Secure and Private Location Proof Generation and Verification Framework., , , , and . IEEE Trans. Comput. Soc. Syst., 7 (2): 293-307 (2020)Towards quantum-secure software defined networks., , , , and . IET Quantum Commun., 5 (1): 66-71 (March 2024)Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 288-300 (2023)RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory., , , , , and . IEEE Netw. Lett., 4 (2): 78-81 (2022)Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks., , , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 3831-3847 (September 2023)Location Privacy Protection in Social Networks. University of Technology Sydney, Australia, (2020)