×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [24]
西安交通大学 [4]
武汉大学 [4]
清华大学 [3]
北京大学 [3]
兰州理工大学 [3]
更多...
内容类型
期刊论文 [39]
会议论文 [17]
其他 [2]
会议 [1]
发表日期
2020 [2]
2019 [3]
2018 [11]
2017 [9]
2016 [6]
2015 [4]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共59条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Location Privacy Protection Algorithm Based on the Division Method of Voronoi in the Internet of Vehicles
会议论文
Hohhot, China, July 17, 2020 - July 20, 2020
作者:
Xie, Peng-shou
;
Han, Xue-ming
;
Feng, Tao
;
Yan, Yan
;
Ma, Guo-qiang
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2020/11/15
Artificial intelligence
Data privacy
Fuzzy sets
Road vehicles
Roads and streets
Vehicle to vehicle communications
Fuzzy algorithms
K-Anonymity
L diversities
Location privacy protection
Protection algorithms
Road network
Time complexity
Voronoi diagrams
A method of constructing arc edge anonymous area based on LBS privacy protection in the internet of vehicles
期刊论文
International Journal of Network Security, 2020, 卷号: 22, 期号: 2, 页码: 275-282
作者:
Xie,Peng-Shou
;
Han,Xue-Ming
;
Feng,Tao
;
Yan,Yan
;
Ma,Guo-Qiang
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/13
Anonymity
Anonymous Regions Constructed
Arc Edge Anonymous Area
Internet of Vehicles
Location Privacy
A survey on location privacy protection in Wireless Sensor Networks
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 卷号: 125, 页码: 93-114
作者:
Jiang, Jinfang
;
Han, Guangjie
;
Wang, Hao
;
Guizani, Mohsen
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/02
Wireless Sensor Networks
Location privacy preserving
Location anonymity
Phantom routing
A caching and spatial [Formula presented]-anonymity driven privacy enhancement scheme in continuous location-based services
期刊论文
Future Generation Computer Systems, 2019, 卷号: Vol.94, 页码: 40-50
作者:
Zhang, Shaobo
;
Li, Xiong
;
Tan, Zhiyuan
;
Peng, Tao
;
Wang, Guojun
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/13
An anonymous entropy-based location privacy protection scheme in mobile social networks
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019
作者:
Ni, Lina
;
Tian, Fulong
;
Ni, Qinghang
;
Yan, Yan
;
Zhang, Jinquan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
Location privacy protection
Location-based service
k-anonymity
Anonymous entropy
kd-tree
On Location Privacy-Preserving Online Double Auction for Electric Vehicles in Microgrids
期刊论文
IEEE Internet of Things Journal, 2018
作者:
Li, Donghe
;
Yang, Qingyu
;
An, Dou
;
Yu, Wei
;
Yang, Xinyu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/19
Demand response
Internet of Things.
Internet of Vehicles
K-anonymity
location privacy and protection
online double auction
Enhancing privacy through uniform grid and caching in location-based services
期刊论文
Future Generation Computer Systems, 2018, 卷号: 86, 页码: 881-892
作者:
Zhang, Shaobo
;
Choo, Kim-Kwang Raymond
;
Liu, Qin
;
Wang, Guojun*
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/03
Location privacy
Uniform grid
Caching
Order-preserving symmetric encryption (OPSE)
k-anonymity
k
RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries
期刊论文
IEEE/ACM Transactions on Networking, 2018, 卷号: Vol.26 No.2, 页码: 1018-1032
作者:
Jiang, HB
;
Zhao, P
;
Wang, C
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/26
Privacy
Servers
IEEE transactions
Robustness
Data privacy
Correlation
Indexes
Location privacy
k-anonymity
continuous LBS queries
location-dependent attacks
ILLIA: Enabling k-Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries
期刊论文
IEEE Internet of Things Journal, 2018, 卷号: Vol.5 No.2, 页码: 1033-1042
作者:
Zhao, Ping
;
Li, Jie
;
Zeng, Fanzi
;
Xiao, Fu
;
Wang, Chen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/26
A Dual Privacy Preserving Scheme in Continuous Location-Based Services
期刊论文
IEEE Internet of Things Journal, 2018, 卷号: Vol.5 No.5, 页码: 4191-4200
作者:
Shaobo Zhang
;
Guojun Wang
;
Zakirul Alam Bhuiyan
;
Qin Liu
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/26
Privacy
Trajectory
Servers
Computer architecture
Internet of Things
Collaboration
Computer science
K-anonymity
multiple anonymizers
query authentication
Shamir threshold
trajectory and content privacy
©版权所有 ©2017 CSpace - Powered by
CSpace