Sign in

Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach.

Cheng LiuYouliang TianJinbo XiongYanhua LuQiuxian LiChanggen Peng
Published in: IEEE Access (2019)
Keyphrases