相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy
Qian Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
PPHOCFS: Privacy Preserving High-Order CFS Algorithm on the Cloud for Clustering Multimedia Data
Qingchen Zhang et al.
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2016)
Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning
Qingchen Zhang et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality
Jie Zhang et al.
MOBILE INFORMATION SYSTEMS (2016)
SpotFi: Decimeter Level Localization Using WiFi
Manikanta Kotaru et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2015)
Transferring Compressive-Sensing-Based Device-Free Localization Across Target Diversity
Ju Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2015)
SpotFi: Decimeter Level Localization Using WiFi
Manikanta Kotaru et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2015)
A Timing-Based Scheme for Rogue AP Detection
Hao Han et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)
RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning
Chad D. Mano et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2008)
A review of smart homes -: Present state and future challenges
Marie Chan et al.
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2008)
Relative location estimation in wireless sensor networks
N Patwari et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2003)