Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption
暂无分享,去创建一个
Chao Lu | Fan Liang | Wei Yu | Weichao Gao | William G. Hatcher | Wei Yu | Fan Liang | Chao Lu | Weichao Gao | W. G. Hatcher
[1] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.
[2] Yang Zhang,et al. Towards truthful auction for big data trading , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).
[3] Xinwen Fu,et al. A Survey on Big Data Market: Pricing, Trading and Protection , 2018, IEEE Access.
[4] Siti Zaiton Mohd Hashim,et al. A robust video watermarking technique for the tamper detection of surveillance systems , 2015, Multimedia Tools and Applications.
[5] K. J. Ray Liu,et al. Data Trading With Multiple Owners, Collectors, and Users: An Iterative Auction Mechanism , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[6] Fan Wu,et al. SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.
[7] Xinyu Yang,et al. A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).
[8] Guihai Chen,et al. A General Privacy-Preserving Auction Mechanism for Secondary Spectrum Markets , 2016, IEEE/ACM Transactions on Networking.
[9] Xiang-Yang Li,et al. Enabling privacy-preserving auctions in big data , 2013, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[10] Xuan Zhou,et al. Buying on Margin and Short Selling in an Artificial Double Auction Market , 2019 .
[11] Ling Li,et al. A Bid Evaluation Method for Multi-attribute Online Reverse Auction , 2017 .
[12] Tianqi Zhou,et al. TPAHS: A Truthful and Profit Maximizing Double Auction for Heterogeneous Spectrums , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[13] Sancheng Peng,et al. An Immunization Framework for Social Networks Through Big Data Based Influence Modeling , 2019, IEEE Transactions on Dependable and Secure Computing.
[14] Kim-Kwang Raymond Choo,et al. An adversary model to evaluate DRM protection of video contents on iOS devices , 2016, Comput. Secur..
[15] Ed Dawson,et al. Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction , 2002, ICICS.
[16] Kirti Jain,et al. A Digital Video Watermarking Algorithm Based on LSB and DCT , 2016 .
[17] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[18] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[19] Andrea Roncoroni. Commodity Price Models , 2010 .
[20] Xinyu Yang,et al. On stochastic optimal bidding strategy for microgrids , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).
[21] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[22] Xinwen Fu,et al. DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[23] Miao Pan,et al. Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.
[24] XiaoYang,et al. Privacy preservation for V2G networks in smart grid , 2016 .
[25] Guihai Chen,et al. Towards Privacy Preservation in Strategy-Proof Spectrum Auction Mechanisms for Noncooperative Wireless Networks , 2015, IEEE/ACM Transactions on Networking.
[26] Xinyu Yang,et al. A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems , 2017, IEEE Transactions on Vehicular Technology.
[27] Liusheng Huang,et al. On Privacy-Preserving Cloud Auction , 2016, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS).
[28] H. Vincent Poor,et al. Mobile data trading: A behavioral economics perspective , 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[29] Xinyu Yang,et al. SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[30] Zhu Han,et al. Market model and optimal pricing scheme of big data and Internet of Things (IoT) , 2016, 2016 IEEE International Conference on Communications (ICC).
[31] Guihai Chen,et al. Trading Data in Good Faith: Integrating Truthfulness and Privacy Preservation in Data Markets , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).
[32] Xiao Lu,et al. Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy , 2018, IEEE Transactions on Dependable and Secure Computing.
[33] Athanasios V. Vasilakos,et al. TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[34] Weijia Jia,et al. A new cell counter based attack against tor , 2009, CCS.
[35] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[36] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[37] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[38] Xuliang Duan,et al. A Pricing Model for Big Personal Data , 2016 .
[39] Makoto Yokoo,et al. Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.
[40] Weijia Jia,et al. Novel Packet Size-Based Covert Channel Attacks against Anonymizer , 2013, IEEE Transactions on Computers.
[41] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[42] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[43] Florian Stahl,et al. Pricing Approaches for Data Markets , 2012, BIRTE.
[44] Jun Cai,et al. Two-Stage Spectrum Sharing With Combinatorial Auction and Stackelberg Game in Recall-Based Cognitive Radio Networks , 2014, IEEE Transactions on Communications.
[45] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[46] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[47] Shui Yu,et al. Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.
[48] MengChu Zhou,et al. VCG Auction-Based Dynamic Pricing for Multigranularity Service Composition , 2018, IEEE Transactions on Automation Science and Engineering.
[49] Wei Yu,et al. A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends , 2018, IEEE Access.
[50] E. Fama,et al. Commodity futures prices: some evidence on forecast power , 1987 .
[51] Anmin Fu,et al. NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users , 2017, IEEE Transactions on Big Data.
[52] Sanming Zhou,et al. Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[53] Dusit Niyato,et al. Profit Maximization Auction and Data Management in Big Data Markets , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[54] Koutroumpis Pantelis,et al. Understanding the value of (big) data , 2013, 2013 IEEE International Conference on Big Data.
[55] Beatriz Lorenzo,et al. A matching game for data trading in operator-supervised user-provided networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[56] Rajiv Ranjan,et al. End-to-End Privacy for Open Big Data Markets , 2015, IEEE Cloud Computing.
[57] Xinyu Yang,et al. On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.
[58] Pramod K. Varshney,et al. Optimal Spectrum Auction Design With 2-D Truthful Revelations Under Uncertain Spectrum Availability , 2017, IEEE/ACM Transactions on Networking.
[59] Oliver Kirchkamp,et al. Outside options: Another reason to choose the first-price auction , 2009 .
[60] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[61] Teng Wang,et al. Survey on Improving Data Utility in Differentially Private Sequential Data Publishing , 2017, IEEE Transactions on Big Data.