Author of the publication

A personalized range-sensitive privacy-preserving scheme in LBSs.

, , , , and . Concurr. Comput. Pract. Exp., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hunting abnormal configurations for permission-sensitive role mining., , , , and . MILCOM, page 1004-1009. IEEE, (2016)Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection., , , , , and . ICC, page 3118-3123. IEEE, (2022)Effects of bullying and perceived social support on anxiety among adolescents with Major Depressive Disorder., , , , , , and . ICIIP, page 179-186. ACM, (2023)A content analysis of public health government WeChat official accounts: the connection between content characteristics and public engagement., , , , , and . ICIIP, page 251-258. ACM, (2023)An Improved DMSQPSO Algorithm For 3D UAV Path Planning., , and . ICIIP, page 62-69. ACM, (2023)Predicting non-suicidal self-injury behavior among adolescents with depressive disorders: a comparative study based on different machine learning methods., , , , , , and . ICIIP, page 187-196. ACM, (2023)Analyzing the Effectiveness of Primary Healthcare in China: A Qualitative Comparative Study Using the TOE Framework., , , , , and . ICIIP, page 266-272. ACM, (2023)Visualized Analyses of the Research on DRG and DIP in China., , , , and . ICIIP, page 106-113. ACM, (2023)Two Dimensional Laplacianfaces Method for Face Recognition., , and . RSCTC, volume 4259 of Lecture Notes in Computer Science, page 852-861. Springer, (2006)Using Similarity Measure to Enhance the Robustness of Web Access Prediction Model., and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 107-111. Springer, (2005)