The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Xudong YANG(2hit)

1-2hit
  • Restoration Based on Sub-Lightpath Rerouting against Non-concurrent Single-Failure in WDM Optical Networks

    Xudong YANG  Qingji ZENG  Xuan LUO  

     
    LETTER-Fiber-Optic Transmission

      Vol:
    E87-B No:2
      Page(s):
    354-356

    We develop a non-concurrent single-failure occurring model, a restoration scheme based on adaptively-decided sub-lightpath rerouting algorithm is then proposed, which aims to achieve better service guaranty with less network status information.

  • A Semantic-Based Dual Location Privacy-Preserving Approach

    Xudong YANG  Ling GAO  Yan LI  Jipeng XU  Jie ZHENG  Hai WANG  Quanli GAO  

     
    PAPER-Information Network

      Pubricized:
    2022/02/16
      Vol:
    E105-D No:5
      Page(s):
    982-995

    With the popularity and development of Location-Based Services (LBS), location privacy-preservation has become a hot research topic in recent years, especially research on k-anonymity. Although previous studies have done a lot of work on anonymity-based privacy protection, there are still several challenges far from being perfectly solved, such as the negative impact on the security of anonymity by the semantic information, which from anonymous locations and query content. To address these semantic challenges, we propose a dual privacy preservation scheme based on the architecture of multi-anonymizers in this paper. Different from existing approaches, our method enhanced location privacy by integrating location anonymity and the encrypted query. First, the query encryption method that combines improved shamir mechanism and multi-anonymizers is proposed to enhance query safety. Second, we design an anonymity method that enhances semantic location privacy through anonymous locations that satisfy personal semantic diversity and replace sensitive semantic locations. Finally, the experiment on the real dataset shows that our algorithms provide much better privacy and use than previous solutions.