Login / Signup
A personalized trajectory privacy protection method.
Jiachun Li
Guoqian Chen
Published in:
Comput. Secur. (2021)
Keyphrases
</>
privacy protection
data sets
information loss
digital libraries
data analysis
data warehouse
data access
normal form