Privacy protection federated learning system based on blockchain and edge computing in mobile crowdsourcing

[1]  Yingjie Wang,et al.  Data-Driven Many-Objective Crowd Worker Selection for Mobile Crowdsourcing in Industrial IoT , 2021, IEEE Transactions on Industrial Informatics.

[2]  Lei Wang,et al.  Optimized Content Caching and User Association for Edge Computing in Densely Deployed Heterogeneous Networks , 2020, IEEE Transactions on Mobile Computing.

[3]  Yuting Tao,et al.  Privacy-preserving and Utility-aware Participant Selection for Mobile Crowd Sensing , 2020, Mob. Networks Appl..

[4]  Z. Cai,et al.  A Triple Real-Time Trajectory Privacy Protection Mechanism Based on Edge Computing and Blockchain in Mobile Crowdsourcing , 2023, IEEE Transactions on Mobile Computing.

[5]  Z. Cai,et al.  New Crowd Sensing Computing in Space-Air-Ground Integrated Networks , 2021, 2021 International Conference on Space-Air-Ground Computing (SAGC).

[6]  Yun Li,et al.  Online Distributed Offloading and Computing Resource Management With Energy Harvesting for Heterogeneous MEC-Enabled IoT , 2021, IEEE Transactions on Wireless Communications.

[7]  Z. Cai,et al.  A two‐stage privacy protection mechanism based on blockchain in mobile crowdsourcing , 2021, Int. J. Intell. Syst..

[8]  M. Shamim Hossain,et al.  Privacy-preserving blockchain-based federated learning for traffic flow prediction , 2021, Future Gener. Comput. Syst..

[9]  Yue Zhang,et al.  DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive , 2019, IEEE Transactions on Dependable and Secure Computing.

[10]  Jun Zhao,et al.  Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices , 2019, IEEE Internet of Things Journal.

[11]  Ming Ding,et al.  Privacy Preserving Location Data Publishing: A Machine Learning Approach , 2019, IEEE Transactions on Knowledge and Data Engineering.

[12]  Junping Du,et al.  Abstractive social media text summarization using selective reinforced Seq2Seq attention model , 2020, Neurocomputing.

[13]  Haomiao Yang,et al.  Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence , 2020, IEEE Transactions on Industrial Informatics.

[14]  Yan Zhang,et al.  Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[15]  Yingjie Wang,et al.  Walrasian Equilibrium-Based Multiobjective Optimization for Task Allocation in Mobile Crowdsourcing , 2020, IEEE Transactions on Computational Social Systems.

[16]  Liu Jian,et al.  CrowdSFL: A Secure Crowd Computing Framework Based on Blockchain and Federated Learning , 2020, Electronics.

[17]  Zhipeng Cai,et al.  Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs , 2020, IEEE Journal on Selected Areas in Communications.

[18]  Yingshu Li,et al.  Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT , 2020, IEEE Internet of Things Journal.

[19]  Yingshu Li,et al.  A worker-selection incentive mechanism for optimizing platform-centric mobile crowdsourcing systems , 2020, Comput. Networks.

[20]  Zhipeng Cai,et al.  A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.

[21]  Yicong Zhou,et al.  Prior Knowledge-Based Probabilistic Collaborative Representation for Visual Recognition , 2020, IEEE Transactions on Cybernetics.

[22]  Mohsen Guizani,et al.  Privacy protection-based incentive mechanism for Mobile Crowdsensing , 2020, Comput. Commun..

[23]  Dongxi Liu,et al.  A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems , 2020, IEEE Transactions on Industrial Informatics.

[24]  Fang-Jing Wu,et al.  CrowdPrivacy: Publish More Useful Data with Less Privacy Exposure in Crowdsourced Location-Based Services , 2020, ACM Trans. Priv. Secur..

[25]  Jianfeng Ma,et al.  Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET , 2020, IEEE Transactions on Vehicular Technology.

[26]  Jiong Jin,et al.  Towards Fair and Privacy-Preserving Federated Deep Models , 2019, IEEE Transactions on Parallel and Distributed Systems.

[27]  Shuyu Li,et al.  A Differentially Private Data Aggregation Method Based on Worker Partition and Location Obfuscation for Mobile Crowdsensing , 2020 .

[28]  M. Starvin,et al.  Blockchain and Internet of Things: An Overview , 2020 .

[29]  Xuemin Shen,et al.  Privbus: A privacy-enhanced crowdsourced bus service via fog computing , 2020, J. Parallel Distributed Comput..

[30]  Fengjun Li,et al.  Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain , 2019, CCS.

[31]  Chen Kai,et al.  Privacy and Security Issues in Machine Learning Systems: A Survey , 2019 .

[32]  Hyoil Kim,et al.  QoE-Aware Computation Offloading to Capture Energy-Latency-Pricing Tradeoff in Mobile Clouds , 2019, IEEE Transactions on Mobile Computing.

[33]  Xuefeng Liu,et al.  Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing , 2019, IEEE Transactions on Services Computing.

[34]  Zhipeng Cai,et al.  Trading Private Range Counting over Big IoT Data , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[35]  Jian Wang,et al.  Location protection method for mobile crowd sensing based on local differential privacy preference , 2019, Peer-to-Peer Networking and Applications.

[36]  Yang Chen,et al.  Effective Scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[37]  Zhipeng Cai,et al.  Task Scheduling in Deadline-Aware Mobile Edge Computing Systems , 2019, IEEE Internet of Things Journal.

[38]  He Yang,et al.  TCNS: Node Selection With Privacy Protection in Crowdsensing Based on Twice Consensuses of Blockchain , 2019, IEEE Transactions on Network and Service Management.

[39]  Jiguo Yu,et al.  A Differential-Private Framework for Urban Traffic Flows Estimation via Taxi Companies , 2019, IEEE Transactions on Industrial Informatics.

[40]  Yingjie Wang,et al.  An Optimization and Auction-Based Incentive Mechanism to Maximize Social Welfare for Mobile Crowdsourcing , 2019, IEEE Transactions on Computational Social Systems.

[41]  Qiang Yang,et al.  Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..

[42]  Vitaly Shmatikov,et al.  Exploiting Unintended Feature Leakage in Collaborative Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[43]  Arun Kumar Bediya,et al.  A Layer-wise Security Analysis for Internet of Things Network: Challenges and Countermeasures , 2019 .

[44]  Ming Xu,et al.  Location Privacy-Preserving Data Recovery for Mobile Crowdsensing , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[45]  Junping Du,et al.  Hashtag Recommendation Based on Multi-Features of Microblogs , 2018, Journal of Computer Science and Technology.

[46]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[47]  Marimuthu Palaniswami,et al.  PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid , 2018, IEEE Transactions on Industrial Informatics.

[48]  Junping Du,et al.  A semantic modeling method for social network short text based on spatial and temporal characteristics , 2017, J. Comput. Sci..

[49]  Giuseppe Ateniese,et al.  Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.

[50]  Zhu Han,et al.  Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[51]  Jeffrey Pennington,et al.  GloVe: Global Vectors for Word Representation , 2014, EMNLP.

[52]  John Kane,et al.  COVAREP — A collaborative voice analysis repository for speech technologies , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[53]  Sitalakshmi Venkatraman,et al.  Detecting malicious behaviour using supervised learning algorithms of the function calls , 2013, Int. J. Electron. Secur. Digit. Forensics.

[54]  Fernando De la Torre,et al.  Facial Expression Analysis , 2011, Visual Analysis of Humans.

[55]  Yong Li,et al.  Ontology based intelligent information retrieval system , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[56]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[57]  S L Warner,et al.  Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.