Author:
Wang Kun,Zhao Wei,Cui Junjie,Cui Yanpeng,Hu Jianwei
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Media Technology,Signal Processing
Reference38 articles.
1. J. Ge, J. Peng, Z. Chen, Your privacy information are leaking when you surfing on the social networks: A survey of the degree of online self-disclosure (DOSD)[C]//Cognitive Informatics & Cognitive Computing (ICCI* CC), 2014 IEEE 13th International Conference on. IEEE, 2014: 329-336.
2. http://tech.sina.com.cn/it/2011-04-27/13575456884.shtml.
3. Numerical algorithm for overhead lines protection and disturbance records analysis;Radojeví c;IET Generation, Trans. Distrib.,2007
4. Privacy-implications of performance-based peer selection by onion-routers: a real-world case study using I2P[C];Herrmann,2011
5. T. Gao, Q. Miao, N. Guo, Anonymous Authentication Scheme Based on Proxy Group Signature for Wireless MESH Network[C]//Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on. IEEE, 2014: 533-537.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献