A Privacy Aware Architecture for IoT Enabled Systems
暂无分享,去创建一个
Liming Chen | Ismini Psychoula | Huansheng Ning | Xuanxia Yao | Huansheng Ning | Liming Chen | I. Psychoula | Xuanxia Yao
[1] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[2] Liming Chen,et al. Users' Privacy Concerns in IoT Based Applications , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[3] Ke Xu,et al. Cleaning the Null Space: A Privacy Mechanism for Predictors , 2017, AAAI.
[4] Wenjing Lou,et al. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.
[5] Timothy W. Finin,et al. Semantic approach to automating management of big data privacy policies , 2016, 2016 IEEE International Conference on Big Data (Big Data).
[6] Mahadev Satyanarayanan,et al. Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[7] Jan Sliwa. A Generalized Framework for Multi-party Data Exchange for IoT Systems , 2016, 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).
[8] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[9] J. Cheon,et al. Survey on Identity based and Hierarchical Identity based Encryption Schemes , 2016 .
[10] Liming Chen,et al. Privacy modelling and management for assisted living within smart homes , 2017, 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom).
[11] Yadu N. Babuji,et al. Cloud Kotta: Enabling secure and scalable data analytics in the cloud , 2016, 2016 IEEE International Conference on Big Data (Big Data).
[12] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[13] Martín Abadi,et al. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data , 2016, ICLR.
[14] Pengtao Xie,et al. Crypto-Nets: Neural Networks over Encrypted Data , 2014, ArXiv.
[15] Bhiksha Raj,et al. Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.
[16] MengChu Zhou,et al. A Privacy-Preserving Message Forwarding Framework for Opportunistic Cloud of Things , 2018, IEEE Internet of Things Journal.
[17] Andreas Holzinger,et al. Users' Perceptions and Attitudes Towards Smart Home Technologies , 2018, ICOST.
[18] Liming Chen,et al. A Deep Learning Approach for Privacy Preservation in Assisted Living , 2018, 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[19] Bhiksha Raj,et al. Privacy preserving probabilistic inference with Hidden Markov Models , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[20] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[21] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[22] Maryline Laurent-Maknavicius,et al. Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.
[23] Hong Liu,et al. Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.
[24] Michael Naehrig,et al. Private Predictive Analysis on Encrypted Medical Data , 2014, IACR Cryptol. ePrint Arch..
[25] Srinivas Devadas,et al. Identification and authentication of integrated circuits , 2004, Concurr. Pract. Exp..
[26] Helen J. Wang,et al. SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser , 2015, 2015 IEEE Symposium on Security and Privacy.
[27] Yuguang Fang,et al. EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis , 2018, IEEE Internet of Things Journal.
[28] Antonino Mazzeo,et al. Authenticating IoT Devices with Physically Unclonable Functions Models , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
[29] Alessandro Acquisti,et al. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions , 2016, SOUPS.
[30] Costas J. Spanos,et al. Privacy-Enhanced Architecture for Occupancy-Based HVAC Control , 2016, 2017 ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS).
[31] Mianxiong Dong,et al. When Weather Matters: IoT-Based Electrical Load Forecasting for Smart Grid , 2017, IEEE Communications Magazine.
[32] Mahadev Satyanarayanan,et al. Privacy Mediators: Helping IoT Cross the Chasm , 2016, HotMobile.
[33] Maximilian Hofer,et al. Physical Unclonable Functions in Theory and Practice , 2012 .
[34] Eui-Nam Huh,et al. Cloud of Things: Integration of IoT with Cloud Computing , 2016 .
[35] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[36] Prem Prakash Jayaraman,et al. Internet of things: from internet scale sensing to smart services , 2016, Computing.
[37] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[38] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.