Author of the publication

DALP: A demand-aware location privacy protection scheme in continuous location-based services.

, , , and . Concurrency and Computation: Practice and Experience, 28 (4): 1219-1236 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic Model Predictive Control Strategy Based on Integrated Weighted Least Square Support Vector Machines., , , , and . ISCID (2), page 216-220. IEEE Computer Society, (2009)Lab performance analysis of a 4G LTE prototype., , , , , , and . WCNC, page 1244-1249. IEEE, (2009)Improved differential evolution algorithm used for load distribution of hot strip rolling., and . BIC-TA, page 526-530. IEEE, (2010)Dual perturbation AGC design based on QFT/µ controller., and . FSKD, page 1834-1838. IEEE, (2010)An optimal query strategy for protecting location privacy in location-based services., , , , and . Peer-to-Peer Networking and Applications, 9 (4): 752-761 (2016)Estimation of Posterior Fossa Volume in Pediatric Patients with Chiari Malformations by the Cavalieri Principle., , , , and . BMEI (1), page 591-595. IEEE Computer Society, (2008)Feature engineering and tree modeling for author-paper identification challenge., , , , and . KDD Cup, page 5:1-5:8. ACM, (2013)Wi-Wheat: Contact-Free Wheat Moisture Detection with Commodity WiFi., , , and . ICC, page 1-6. IEEE, (2018)Keyword-Aware Dominant Route Search for Various User Preferences., , , and . DASFAA (2), volume 9050 of Lecture Notes in Computer Science, page 207-222. Springer, (2015)Repairing Data Violations with Order Dependencies., , , , , and . DASFAA (2), volume 10828 of Lecture Notes in Computer Science, page 283-300. Springer, (2018)