Author of the publication

Privacy Protection in Social Networks Using l-Diversity.

, , , , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 435-444. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Protection in Social Networks Using l-Diversity., , , , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 435-444. Springer, (2012)Authenticating Users of Recommender Systems Using Naive Bayes., , , , and . WISE (1), volume 8180 of Lecture Notes in Computer Science, page 199-208. Springer, (2013)Network Traffic Based iOS Application Automatically Analyzing System., , and . iThings/GreenCom/CPSCom/SmartData, page 230-234. IEEE Computer Society, (2017)Sensitive Edges Protection in Social Networks., , , , , and . WAIM, volume 7923 of Lecture Notes in Computer Science, page 564-569. Springer, (2013)A Hybrid Approach for Privacy Preservation in Location Based Queries., , , , , and . WAIM Workshops, volume 7901 of Lecture Notes in Computer Science, page 315-326. Springer, (2013)MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET., , , , , and . APWeb, volume 7808 of Lecture Notes in Computer Science, page 583-594. Springer, (2013)RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs., , , , and . WAIM, volume 7418 of Lecture Notes in Computer Science, page 352-362. Springer, (2012)Edges Protection in Multiple Releases of Social Network Data., , , , , and . WAIM, volume 8485 of Lecture Notes in Computer Science, page 669-680. Springer, (2014)Privacy Protection against Query Prediction in Location-Based Services., , , , , and . UIC/ATC/ScalCom, page 525-532. IEEE Computer Society, (2014)Permission-Based Abnormal Application Detection for Android., , , , , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 228-239. Springer, (2012)