Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Clustering-Anonymity Method for Privacy Preserving Table Data Sharing

    In the era of big data, the open sharing of government data has increasingly attracted the attention of governments. However, there is privacy leakage risk in the government’s data sharing. For the scene of sh...

    Li** Liu, Chunhui Piao, Huirui Cao in Advances in E-Business Engineering for Ubi… (2020)

  2. No Access

    Chapter and Conference Paper

    Privacy Preserving Government Data Sharing Based on Hyperledger Blockchain

    With the further advancement of the government information resource sharing mechanism, the realization of data sharing between departments under the support of safe and effective technology has become focus of...

    Yurong Hao, Chunhui Piao, Yongbin Zhao in Advances in E-Business Engineering for Ubi… (2020)

  3. No Access

    Chapter and Conference Paper

    P3RN:Personalized Privacy Protection Using Query Semantics over Road Networks

    Privacy protection has received considerable attention for location-based services. A lot of location cloaking approaches focus on the identity and location protection, but few algorithms pay attention to prev...

    **ao Pan, Lei Wu, Chunhui Piao, **aoshuo Xu in Web-Age Information Management (2014)