Author:
Liu Wen Ming,Wang Lingyu,Cheng Pengsu,Ren Kui,Zhu Shunzhi,Debbabi Mourad
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Subject
Electrical and Electronic Engineering
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Optimally Hiding Object Sizes with Constrained Padding;2023 IEEE 36th Computer Security Foundations Symposium (CSF);2023-07
2. A Feature-Flux Traffic Camouflage Method based on Twin Gaussian Process;2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2021-10
3. Nori: Concealing the Concealed Identifier in 5G;The 16th International Conference on Availability, Reliability and Security;2021-08-17
4. Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness;IEEE Transactions on Dependable and Secure Computing;2019-07-01
5. Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge;2019 IEEE International Conference on Pervasive Computing and Communications (PerCom;2019-03