相关期刊:《Frontiers of Computer Science》《Wuhan University Journal of Natural Sciences》《Journal of Donghua University(English Edition)》《Journal of Information Security》更多>>
Supported by the National Natural Science Foundation of China(61472097);Specialized Research Fund for the Doctoral Program of Higher Education of China(20132304110017);Natural Science Foundation of Heilongjiang Province of China(F2015022)
Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle i...