[1] |
GUO Zijing, LUO Yuchuan, CAI Zhiping, ZHENG Tengfei.
Overview of Privacy Protection Technology of Big Data in Healthcare
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(3): 389-402.
|
[2] |
GAO Ang, LIANG Ying, XIE Xiaojie, WANG Zisen, LI Jintao.
Social Network Information Diffusion Method with Support of Privacy Protection
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(2): 233-248.
|
[3] |
QU Jingjing, CAI Ying, FAN Yanfang, XIA Hongke.
Differentially Private Mixed Data Release Algorithm Based on k-prototype Clustering
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(1): 109-118.
|
[4] |
DONG Xiangxiang, GAO Ang, LIANG Ying, BI Xiaodi.
Method of Privacy Preserving in Dynamic Social Network Data Publication
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1441-1458.
|
[5] |
SUN Ziwen, LI Song.
Lightweight Authentication Protocol for Location Privacy Using PUF in Mobile RFID System
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 418-428.
|
[6] |
YANG Gaoming, FANG Xianjin+, XIAO Yafei.
Local Differential Privacy Against Link Attack
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(2): 251-262.
|
[7] |
WU Yingjie, CHEN Jinglin, CAI Jianping, WANG Yilei.
Error Analysis of Differential Privacy Data Publishing Method with Matrix Mechanism
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(7): 1075-1086.
|
[8] |
TAO Lingling, HUANG Zhiqiu, CAO Yan, ZHANG Mengjiao.
Privacy Preserving Method for Supporting Access Purpose and Reputation Labeling
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 719-729.
|
[9] |
JIANG Jiaxin, HUANG Zhiqiu, MA Weiwei.
Research on Information Flow Control in Service Composition for Privacy Requirement
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(3): 370-379.
|
[10] |
ZHANG Shuangyue, CAI Jianping, TIAN Feng, WU Zhenqiang.
Trajectory Flow Releasing Method with Consistency Constraint under Differential Privacy
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(12): 1903-1913.
|
[11] |
GE Chen, WU Yingjie, SUN Lan.
Real-Time Publishing Method of Differential Privacy Streaming Data
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(11): 1748-1757.
|
[12] |
LI Xiangdong, ZHANG Shaobo, GUO Min, WANG Guojun.
Location Privacy Protection Method Based on Grid
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(8): 1258-1268.
|
[13] |
JIN Kaizhong, ZHANG Xiaojian, PENG Huili.
KD-TSS: Accurate Method for Private Spatial Decomposition
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(10): 1579-1590.
|
[14] |
KANG Jian, WU Yingjie, HUANG Siyong, CHEN Hong, SUN Lan.
Algorithm for Differential Privacy Histogram Publication with Non-uniform Private Budget
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(6): 786-798.
|
[15] |
CAI Jianping, WU Yingjie, WANG Xiaodong.
Method Based on Matrix Mechanism for Differential Privacy Continual Data Release
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(4): 481-494.
|