Publications |
Research Publications:
[1] YAN YAN, XIN GAO, ADNAN MAHMOOD, TAO FENG, PENGSHOU XIE. Differential Private Spatial Decomposition and Location Publishing Based on Unbalanced Quadtree Partition Algorithm [J]. IEEE Access, 2020, vol.8, issue.1, 164962-164974.
[2] Dynamic Release of Big Location Data Based on Adaptive Sampling and Differential Privacy [J]. IEEE Access, 2019, vol.7, issue.1, 164962-164974.
[3] Modelling the Publishing Process of Big Location Data Using Deep Learning Prediction Methods [J]. Electronics, 2020, 9(3), 420
[4] Hierarchical differential privacy hybrid decomposition algorithm for location big data [J]. Cluster Computing - the Journal of Networks Software Tools and Applications, 2019, Volume 22, Supplement 4, 9269–9280.
[5] Location big data differential privacy dynamic partition release method [J]. International Journal of Security and Networks, 2020, vol. 15, No. 1, 25-35.
[6] Location big data partitioning and publishing method based on sampling and adjustment [J]. Engineering Letters, 2020, vol. 28, no. 2, 280-289.
[7] Information Aggregation Method of Intuitionistic Fuzzy Set Pair Analysis in Multi-Attribute Privacy Risk Decision-Making [J]. International Journal of Network Security, 2020,
[8] FSSPCM: fuzzy publication of data for privacy preserving [J]. International Journal of Security and Its Applications, 2016, vol.10, no.11: 229-248.
[9] Finding quasi-identifiers for k-anonymity model by the set of cut-vertex [J]. Engineering Letters, 2018, vol. 26, no. 1, pp: 150-160.
[13] Universal Steganalysis Method Based on Multi-domain Features. Journal of Information & Computational Science, 2013, Vol.10, NO.7: 2177-2185. (EI: 20132316396475)
[14] A Novel Robust Reversible Information Hiding Algorithm based on Interval Region. Journal of Applied Sciences, 2013, 13(22): 5113-5119, (EI: 20134717008793)
[15] Content-based Hierarchical Authentication Watermarking Algorithm Based on Image Quad-tree Decomposition [J]. Journal of Information & Computational Science, 2011, Vol.8, NO.8: 1333-1343 (EI: 20113314234959)
[2] Dynamic Release of Big Location Data Based on Adaptive Sampling and Differential Privacy [J]. IEEE Access, 2019, vol.7, issue.1, 164962-164974.
[3] Modelling the Publishing Process of Big Location Data Using Deep Learning Prediction Methods [J]. Electronics, 2020, 9(3), 420
[4] Hierarchical differential privacy hybrid decomposition algorithm for location big data [J]. Cluster Computing - the Journal of Networks Software Tools and Applications, 2019, Volume 22, Supplement 4, 9269–9280.
[5] Location big data differential privacy dynamic partition release method [J]. International Journal of Security and Networks, 2020, vol. 15, No. 1, 25-35.
[6] Location big data partitioning and publishing method based on sampling and adjustment [J]. Engineering Letters, 2020, vol. 28, no. 2, 280-289.
[7] Information Aggregation Method of Intuitionistic Fuzzy Set Pair Analysis in Multi-Attribute Privacy Risk Decision-Making [J]. International Journal of Network Security, 2020,
[8] FSSPCM: fuzzy publication of data for privacy preserving [J]. International Journal of Security and Its Applications, 2016, vol.10, no.11: 229-248.
[9] Finding quasi-identifiers for k-anonymity model by the set of cut-vertex [J]. Engineering Letters, 2018, vol. 26, no. 1, pp: 150-160.
[13] Universal Steganalysis Method Based on Multi-domain Features. Journal of Information & Computational Science, 2013, Vol.10, NO.7: 2177-2185. (EI: 20132316396475)
[14] A Novel Robust Reversible Information Hiding Algorithm based on Interval Region. Journal of Applied Sciences, 2013, 13(22): 5113-5119, (EI: 20134717008793)
[15] Content-based Hierarchical Authentication Watermarking Algorithm Based on Image Quad-tree Decomposition [J]. Journal of Information & Computational Science, 2011, Vol.8, NO.8: 1333-1343 (EI: 20113314234959)