Author of the publication

Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach.

, , , and . ICCCN, page 1-6. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach., , , and . ICCCN, page 1-6. IEEE, (2014)Quantifying Location Privacy Risks Under Heterogeneous Correlations., , and . IEEE Access, (2021)Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service., , , and . Frontiers Comput. Sci., 11 (3): 465-484 (2017)Convenient Top-k Location-Text Publish/Subscribe Scheme., , , , and . ISICA (2), volume 874 of Communications in Computer and Information Science, page 183-191. Springer, (2017)CTP: Correlated Trajectory Publication with Differential Privacy., , and . ICCCS, page 128-133. IEEE, (2021)Equi-join for Multiple Datasets Based on Time Cost Evaluation Model., , , and . ICA3PP (2), volume 8631 of Lecture Notes in Computer Science, page 122-135. Springer, (2014)Autonomous Decentralized Tenant Access Control Model for Sub-tenancy Architecture in Software-as-a-Service (SaaS)., , and . ISADS, page 211-216. IEEE Computer Society, (2015)Tracking and Repairing Damaged Databases Using Before Image Table., , , and . FCST, page 36-41. IEEE Computer Society, (2008)Anonymization on refining partition: Same privacy, more utility., , and . ICSAI, page 998-1005. IEEE, (2014)LISC: Location Inference Attack Enhanced by Spatial-Temporal-Social Correlations., , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1083-1092. IEEE, (2019)