Sign in

Protecting Trajectory From Semantic Attack Considering ${k}$ -Anonymity, ${l}$ -Diversity, and ${t}$ -Closeness.

Zhen TuKai ZhaoFengli XuYong LiLi SuDepeng Jin
Published in: IEEE Trans. Netw. Serv. Manag. (2019)
Keyphrases