Skip to main content

and
  1. No Access

    Article

    Privacy protection in government data sharing: an improved LDP-based approach

    Governments own various types and large amounts of individual data. One governmental department manages specific areas of data. To develop smart government, data need to be shared among the governmental depart...

    Chunhui Piao, Yurong Hao, Jiaqi Yan in Service Oriented Computing and Applications (2021)

  2. No Access

    Article

    Clustering-based privacy preserving anonymity approach for table data sharing

    Government data sharing can effectively improve the efficiency and quality of government services and enhance the ability of providing government services. However, data sharing may bring the risk of citizen p...

    Chunhui Piao, Li** Liu, Yajuan Shi in International Journal of System Assurance … (2020)

  3. No Access

    Chapter and Conference Paper

    Clustering-Anonymity Method for Privacy Preserving Table Data Sharing

    In the era of big data, the open sharing of government data has increasingly attracted the attention of governments. However, there is privacy leakage risk in the government’s data sharing. For the scene of sh...

    Li** Liu, Chunhui Piao, Huirui Cao in Advances in E-Business Engineering for Ubi… (2020)

  4. No Access

    Chapter and Conference Paper

    Privacy Preserving Government Data Sharing Based on Hyperledger Blockchain

    With the further advancement of the government information resource sharing mechanism, the realization of data sharing between departments under the support of safe and effective technology has become focus of...

    Yurong Hao, Chunhui Piao, Yongbin Zhao in Advances in E-Business Engineering for Ubi… (2020)

  5. No Access

    Article

    Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile services

    Privacy preservation has recently received considerable attention for location-based mobile services. A lot of location cloaking approaches focus on identity and location protection, but few algorithms pay att...

    **ao Pan, Weizhang Chen, Lei Wu, Chunhui Piao, Zhaojun Hu in Frontiers of Computer Science (2016)

  6. No Access

    Chapter and Conference Paper

    P3RN:Personalized Privacy Protection Using Query Semantics over Road Networks

    Privacy protection has received considerable attention for location-based services. A lot of location cloaking approaches focus on the identity and location protection, but few algorithms pay attention to prev...

    **ao Pan, Lei Wu, Chunhui Piao, **aoshuo Xu in Web-Age Information Management (2014)