Sign in

Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.

Zhen HongRui WangShouling JiRaheem Beyah
Published in: IEEE Trans. Inf. Forensics Secur. (2019)
Keyphrases
  • location privacy
  • real time
  • location based services
  • location information