Funder
Post Doctoral Fund Project in China
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference46 articles.
1. Zhao, P., Zhang, G., Wan, S., et al. (2019). A survey of local differential privacy for securing internet of vehicles. The Journal of Supercomputing. https://doi.org/10.1007/s11227-019-03104-0
2. Yin, C., et al. (2018). Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3628–3636.
3. Zhao, P., Huang, H., Zhao, X., & Huang, D. (2020). P3: Privacy-preserving scheme against poisoning attacks in mobile-edge computing. IEEE Transactions on Computational Social Systems. https://doi.org/10.1109/TCSS.2019.2960824.
4. Lei, Z., et al. (2017). A real-time similar trajectories generation algorithm for trajectories differences identification resistance. Journal of Harbin Engineering University, 07, 1173–1178.
5. Ye, A. Y., Li, Y., & Xu, L. (2017). A novel location privacy-preserving scheme based on l-queries for continuous LBS. Computer Communications, 98, 1–10.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献