[1] |
LI Ximing, WU Jiarun, WU Shaoqian.
GANs Based Privacy Amplification Against Bounded Adversaries
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(7): 1220-1226.
|
[2] |
GUO Zijing, LUO Yuchuan, CAI Zhiping, ZHENG Tengfei.
Overview of Privacy Protection Technology of Big Data in Healthcare
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(3): 389-402.
|
[3] |
GAO Ang, LIANG Ying, XIE Xiaojie, WANG Zisen, LI Jintao.
Social Network Information Diffusion Method with Support of Privacy Protection
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(2): 233-248.
|
[4] |
QU Jingjing, CAI Ying, FAN Yanfang, XIA Hongke.
Differentially Private Mixed Data Release Algorithm Based on k-prototype Clustering
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(1): 109-118.
|
[5] |
LAN Wei, LIN Ying, BAO Lingyan, LI Tong, CHEN Mengrong, SHAN Jinzhao.
Trajectory-Differential Privacy-Protection Method with Interest Region
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(1): 59-72.
|
[6] |
DONG Xiangxiang, GAO Ang, LIANG Ying, BI Xiaodi.
Method of Privacy Preserving in Dynamic Social Network Data Publication
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1441-1458.
|
[7] |
ZHANG Xiaolin, YUAN Haochen, LI Zhuolin, ZHANG Huanxiang, LIU Jiao.
Subgraph Matching Oriented Privacy Preserving Method for Social Network
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1504-1515.
|
[8] |
TONG Danni, SHEN Derong, HAN Shumin, NIE Tiezheng, KOU Yue, YU Ge.
Multi-Party Strong-Privacy-Preserving Record Linkage Method
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 394-407.
|
[9] |
SUN Ziwen, LI Song.
Lightweight Authentication Protocol for Location Privacy Using PUF in Mobile RFID System
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 418-428.
|
[10] |
YANG Gaoming, FANG Xianjin+, XIAO Yafei.
Local Differential Privacy Against Link Attack
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(2): 251-262.
|
[11] |
WANG Jingyu, XU Mingkun, WANG Haoyu, XU Guo'ai.
Automated Detection of Consistence Between App Behavior and Privacy Policy of Android Apps
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(1): 56-69.
|
[12] |
ZHANG Xiaolin, HE Xiaoyu, ZHANG Huanxiang, LI Zhuolin.
PLRD-(k,m):Distributed k-Degree-m-Label Anonymity with Protecting Link Rela-tionships
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(1): 70-82.
|
[13] |
ZHANG Xianxian, WANG Haoyu, GUO Yao, XU Guo'ai.
Privacy Rating for Mobile Apps Based on Crowdsourcing and Machine-Learning Techniques
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(8): 1238-1251.
|
[14] |
WU Yingjie, CHEN Jinglin, CAI Jianping, WANG Yilei.
Error Analysis of Differential Privacy Data Publishing Method with Matrix Mechanism
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(7): 1075-1086.
|
[15] |
WANG Ping, ZHOU Zhiping, LI Jing.
Improved Server-less RFID Security Authentication Protocol
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(7): 1117-1125.
|