共 50 条
- [1] SocialCloaking: a Distributed Architecture for K-anonymity Location Privacy Protection [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 247 - 251
- [2] An Adaptive Learning Model for k-Anonymity Location Privacy Protection [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 10 - 16
- [3] k-anonymity based location privacy protection method for location-based services in Internet of Thing [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (20):
- [4] A Personalized k-Anonymity with Fake Position Generation for Location Privacy Protection [J]. FRONTIERS IN INTERNET TECHNOLOGIES, 2015, 502 : 46 - 55
- [5] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
- [7] Anatomy: Uncertain data k-anonymity privacy protection algorithm [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1689 - +
- [8] A Distributed k-Anonymity Protocol for Location Privacy [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 253 - 262
- [9] Research on K-Anonymity Algorithm in Privacy Protection [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 194 - 196