Author of the publication

Toward inference attacks for k-anonymity.

, , , and . Personal and Ubiquitous Computing, 18 (8): 1871-1880 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamics and Entropy Analysis for a New 4-D Hyperchaotic System with Coexisting Hidden Attractors., , , , and . Entropy, 21 (3): 287 (2019)An offset boostable hidden circuit and its digital information transmission., , , and . UEMCON, page 187-194. IEEE, (2022)Synchronization of Fractional-Order Complex Chaotic System Using Active Control Method., , and . UEMCON, page 817-823. IEEE, (2019)Towards a Trusted Mobile RFID Network Framework., , and . CyberC, page 53-58. IEEE Computer Society, (2013)A Lane Detection Method Based on a Ridge Detector and Regional G-RANSAC., , , , , and . Sensors, 19 (18): 4028 (2019)EAC: A Framework of Authentication Property for the IOTs., , , and . CyberC, page 102-105. IEEE Computer Society, (2014)Balancing authentication and location privacy in cooperative authentication., , , and . ANCS, page 107-108. IEEE Computer Society, (2013)A General Framework of Nonleakage-Based Authentication Using CSP for the Internet of Things., , and . APWeb Workshophs, volume 8710 of Lecture Notes in Computer Science, page 312-324. Springer, (2014)Adaptive Image Defogging Algorithm Based on DCNN., , , , , and . DSIT, page 42-46. ACM, (2020)Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs., , , and . TrustCom, page 212-220. IEEE Computer Society, (2014)