Author of the publication

LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme.

, , , , , and . Mobile Information Systems, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capacity Optimization of IR Ultra-wide Band System Under the Coexistence with IEEE 802.11n., and . Ad Hoc & Sensor Wireless Networks, 21 (1-2): 59-75 (2014)Physical Synthesis with Clock-Network Optimization for Large Systems on Chips., , , , , , and . IEEE Micro, 31 (4): 51-62 (2011)Spaceborne SIMO-SAR for three-dimensional ionospheric irregularity sounding., , and . IEEE Trans. Aerospace and Electronic Systems, 50 (4): 2830-2846 (2014)11.2 A 10.8ps-time-resolution 256×512 image sensor with 2-Tap true-CDS lock-in pixels for fluorescence lifetime imaging., , , , , , , , and . ISSCC, page 1-3. IEEE, (2015)ORB feature based web pornographic image recognition., , , and . Neurocomputing, (2016)An approach of bag-of-words based on visual attention model for pornographic images recognition in compressed domain., , , , and . Neurocomputing, (2013)An efficient motion reference structure based selective encryption algorithm for H.264 videos., , and . IET Information Security, 8 (3): 199-206 (2014)Layered-based exposure fusion algorithm., , , and . IET Image Processing, 7 (7): 701-711 (2013)The hybrid architecture of wireless and power line communications in HANs for Smart Grid security., , , , and . Security and Communication Networks, 8 (14): 2404-2410 (2015)Learning realistic facial expressions from web images., , , , , and . Pattern Recognition, 46 (8): 2144-2155 (2013)