Author of the publication

Novel trajectory privacy-preserving method based on prefix tree using differential privacy.

, , and . Knowl. Based Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remote sensing image fusion based on Bayesian GAN., , and . CoRR, (2020)FDPPGAN: remote sensing image fusion based on deep perceptual patchGAN., , , and . Neural Comput. Appl., 33 (15): 9589-9605 (2021)HNIO: A Hybrid Nature-Inspired Optimization Algorithm for Energy Minimization in UAV-Assisted Mobile Edge Computing., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 3264-3275 (2022)A two-stage adversarial Transformer based approach for multivariate industrial time series anomaly detection., , and . Appl. Intell., 54 (5): 4210-4229 (March 2024)Novel trajectory privacy-preserving method based on prefix tree using differential privacy., , and . Knowl. Based Syst., (2020)Rumor detection based on propagation graph neural network with attention mechanism., , , , and . Expert Syst. Appl., (2020)Lifelong Classification in Open World With Limited Storage Requirements., , , and . Neural Comput., 33 (7): 1818-1852 (2021)Knowledge embedding via hyperbolic skipped graph convolutional networks., , and . Neurocomputing, (2022)Denosieformer: A Transformer-Based Approach for Single-Channel EEG Artifact Removal., , , , , and . IEEE Trans. Instrum. Meas., (2024)Adaptive Steganography Based on Image Edge Enhancement and Automatic Distortion Learning., , and . ICIG (3), volume 12890 of Lecture Notes in Computer Science, page 155-167. Springer, (2021)