| index | Title |
| 1 | Distributed anonymous data perturbation method for privacy-preserving data mining Author(s):Feng LI, Jin MA, Jian-hua LI Clicked:7985 Download:5794 Cited:3 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.7 P.952-963 DOI:10.1631/jzus.A0820320 |
| 2 | Towards a respondent-preferred ki-anonymity model Author(s):Kok-Seng Wong, Myung Ho Kim Clicked:8919 Download:4169 Cited:2 <Full Text> <PPT> 2436 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.9 P.720-731 DOI:10.1631/FITEE.1400395 |
| 3 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan Clicked:10245 Download:4563 Cited:0 <Full Text> <PPT> 3042 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
| 4 | Faster fog-aided private set intersection with integrity preserving Author(s):Qiang Wang, Fu-cai Zhou, Tie-min Ma, Zi-feng Xu Clicked:7030 Download:4477 Cited:0 <Full Text> <PPT> 2347 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1558-1568 DOI:10.1631/FITEE.1800518 |
| 5 | An efficient online histogram publication method for data streams with local differential privacy Author(s):Tao TAO, Funan ZHANG, Xiujun WANG, Xiao ZHENG, Xin ZHAO Clicked:3024 Download:3549 Cited:0 <Full Text> <PPT> 955 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.8 P.1096-1109 DOI:10.1631/FITEE.2300368 |
| 6 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the Internet of Things Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu CHENG, Roshan KUMAR Clicked:2444 Download:3090 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |
