2017
DOI: 10.1007/s11277-017-4833-8
|View full text |Cite
|
Sign up to set email alerts
|

Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…In this section, three influence maximization methods, two cascade influence models, and two attack models are discussed for comparison. ree influence maximization methods are degree-based [20], random-based [30], and our ICPM method. For the degree-based method, k nodes with higher degree will be selected.…”
Section: Performance Evaluationsmentioning
confidence: 99%
“…In this section, three influence maximization methods, two cascade influence models, and two attack models are discussed for comparison. ree influence maximization methods are degree-based [20], random-based [30], and our ICPM method. For the degree-based method, k nodes with higher degree will be selected.…”
Section: Performance Evaluationsmentioning
confidence: 99%
“…Therefore, the core of the technology based on distortion is to design the best privacy protection algorithm when the attacker has obtained the side information. This algorithm cannot only satisfy the needs of users for the quality of service but also meet the requirements of users to protect privacy [32]. In Ref.…”
Section: Location Privacy Mechanismsmentioning
confidence: 99%