Author of the publication

LBSs privacy preserving for continuous query based on semi-honest third parties.

, , , , and . IPCCC, page 384-391. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the low rank solution of the Q-weighted nearest correlation matrix problem., , , and . Numerical Lin. Alg. with Applic., 23 (2): 340-355 (2016)The Solutions of Matrix Equation AX=B Over a Matrix Inequality Constraint., , and . SIAM J. Matrix Analysis Applications, 33 (2): 554-568 (2012)Learning through Changes: An Empirical Study of Dynamic Behaviors of Probability Estimation Trees., , , and . ICDM, page 817-820. IEEE Computer Society, (2005)Performance Bounded Reinforcement Learning in Strategic Interactions., and . AAAI, page 2-7. AAAI Press / The MIT Press, (2004)Delayed reinforcement learning for closed-loop object recognition., and . ICPR, page 310-314. IEEE Computer Society, (1996)Toward Effective Social Contagion: A Micro Level Analysis of the Impact of Dyadic Network Relationship., , , and . ICIS, Association for Information Systems, (2014)A New Content-Based Image Retrieval System Using Hang Gesture And Relevange Feedback., , and . ICME, IEEE Computer Society, (2001)Analysis of Chernoff criterion for linear dimensionality reduction., , , and . SMC, page 3014-3021. IEEE, (2010)Delayed reinforcement learning for adaptive image segmentation and feature extraction., and . IEEE Trans. Systems, Man, and Cybernetics, Part C, 28 (3): 482-488 (1998)Margin based likelihood map fusion for target tracking., and . IGARSS, page 2292-2295. IEEE, (2012)