共 50 条
- [47] Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 271 - 290
- [48] Exploiting Spatio-Temporal User Behaviors for User Linkage CIKM'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2017, : 517 - 526