Privacy protection federated learning system based on blockchain and edge computing in mobile crowdsourcing
暂无分享,去创建一个
[1] Yingjie Wang,et al. Data-Driven Many-Objective Crowd Worker Selection for Mobile Crowdsourcing in Industrial IoT , 2021, IEEE Transactions on Industrial Informatics.
[2] Lei Wang,et al. Optimized Content Caching and User Association for Edge Computing in Densely Deployed Heterogeneous Networks , 2020, IEEE Transactions on Mobile Computing.
[3] Yuting Tao,et al. Privacy-preserving and Utility-aware Participant Selection for Mobile Crowd Sensing , 2020, Mob. Networks Appl..
[4] Z. Cai,et al. A Triple Real-Time Trajectory Privacy Protection Mechanism Based on Edge Computing and Blockchain in Mobile Crowdsourcing , 2023, IEEE Transactions on Mobile Computing.
[5] Z. Cai,et al. New Crowd Sensing Computing in Space-Air-Ground Integrated Networks , 2021, 2021 International Conference on Space-Air-Ground Computing (SAGC).
[6] Yun Li,et al. Online Distributed Offloading and Computing Resource Management With Energy Harvesting for Heterogeneous MEC-Enabled IoT , 2021, IEEE Transactions on Wireless Communications.
[7] Z. Cai,et al. A two‐stage privacy protection mechanism based on blockchain in mobile crowdsourcing , 2021, Int. J. Intell. Syst..
[8] M. Shamim Hossain,et al. Privacy-preserving blockchain-based federated learning for traffic flow prediction , 2021, Future Gener. Comput. Syst..
[9] Yue Zhang,et al. DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive , 2019, IEEE Transactions on Dependable and Secure Computing.
[10] Jun Zhao,et al. Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices , 2019, IEEE Internet of Things Journal.
[11] Ming Ding,et al. Privacy Preserving Location Data Publishing: A Machine Learning Approach , 2019, IEEE Transactions on Knowledge and Data Engineering.
[12] Junping Du,et al. Abstractive social media text summarization using selective reinforced Seq2Seq attention model , 2020, Neurocomputing.
[13] Haomiao Yang,et al. Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence , 2020, IEEE Transactions on Industrial Informatics.
[14] Yan Zhang,et al. Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.
[15] Yingjie Wang,et al. Walrasian Equilibrium-Based Multiobjective Optimization for Task Allocation in Mobile Crowdsourcing , 2020, IEEE Transactions on Computational Social Systems.
[16] Liu Jian,et al. CrowdSFL: A Secure Crowd Computing Framework Based on Blockchain and Federated Learning , 2020, Electronics.
[17] Zhipeng Cai,et al. Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs , 2020, IEEE Journal on Selected Areas in Communications.
[18] Yingshu Li,et al. Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT , 2020, IEEE Internet of Things Journal.
[19] Yingshu Li,et al. A worker-selection incentive mechanism for optimizing platform-centric mobile crowdsourcing systems , 2020, Comput. Networks.
[20] Zhipeng Cai,et al. A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.
[21] Yicong Zhou,et al. Prior Knowledge-Based Probabilistic Collaborative Representation for Visual Recognition , 2020, IEEE Transactions on Cybernetics.
[22] Mohsen Guizani,et al. Privacy protection-based incentive mechanism for Mobile Crowdsensing , 2020, Comput. Commun..
[23] Dongxi Liu,et al. A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems , 2020, IEEE Transactions on Industrial Informatics.
[24] Fang-Jing Wu,et al. CrowdPrivacy: Publish More Useful Data with Less Privacy Exposure in Crowdsourced Location-Based Services , 2020, ACM Trans. Priv. Secur..
[25] Jianfeng Ma,et al. Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET , 2020, IEEE Transactions on Vehicular Technology.
[26] Jiong Jin,et al. Towards Fair and Privacy-Preserving Federated Deep Models , 2019, IEEE Transactions on Parallel and Distributed Systems.
[27] Shuyu Li,et al. A Differentially Private Data Aggregation Method Based on Worker Partition and Location Obfuscation for Mobile Crowdsensing , 2020 .
[28] M. Starvin,et al. Blockchain and Internet of Things: An Overview , 2020 .
[29] Xuemin Shen,et al. Privbus: A privacy-enhanced crowdsourced bus service via fog computing , 2020, J. Parallel Distributed Comput..
[30] Fengjun Li,et al. Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain , 2019, CCS.
[31] Chen Kai,et al. Privacy and Security Issues in Machine Learning Systems: A Survey , 2019 .
[32] Hyoil Kim,et al. QoE-Aware Computation Offloading to Capture Energy-Latency-Pricing Tradeoff in Mobile Clouds , 2019, IEEE Transactions on Mobile Computing.
[33] Xuefeng Liu,et al. Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing , 2019, IEEE Transactions on Services Computing.
[34] Zhipeng Cai,et al. Trading Private Range Counting over Big IoT Data , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[35] Jian Wang,et al. Location protection method for mobile crowd sensing based on local differential privacy preference , 2019, Peer-to-Peer Networking and Applications.
[36] Yang Chen,et al. Effective Scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).
[37] Zhipeng Cai,et al. Task Scheduling in Deadline-Aware Mobile Edge Computing Systems , 2019, IEEE Internet of Things Journal.
[38] He Yang,et al. TCNS: Node Selection With Privacy Protection in Crowdsensing Based on Twice Consensuses of Blockchain , 2019, IEEE Transactions on Network and Service Management.
[39] Jiguo Yu,et al. A Differential-Private Framework for Urban Traffic Flows Estimation via Taxi Companies , 2019, IEEE Transactions on Industrial Informatics.
[40] Yingjie Wang,et al. An Optimization and Auction-Based Incentive Mechanism to Maximize Social Welfare for Mobile Crowdsourcing , 2019, IEEE Transactions on Computational Social Systems.
[41] Qiang Yang,et al. Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..
[42] Vitaly Shmatikov,et al. Exploiting Unintended Feature Leakage in Collaborative Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[43] Arun Kumar Bediya,et al. A Layer-wise Security Analysis for Internet of Things Network: Challenges and Countermeasures , 2019 .
[44] Ming Xu,et al. Location Privacy-Preserving Data Recovery for Mobile Crowdsensing , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[45] Junping Du,et al. Hashtag Recommendation Based on Multi-Features of Microblogs , 2018, Journal of Computer Science and Technology.
[46] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[47] Marimuthu Palaniswami,et al. PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid , 2018, IEEE Transactions on Industrial Informatics.
[48] Junping Du,et al. A semantic modeling method for social network short text based on spatial and temporal characteristics , 2017, J. Comput. Sci..
[49] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[50] Zhu Han,et al. Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[51] Jeffrey Pennington,et al. GloVe: Global Vectors for Word Representation , 2014, EMNLP.
[52] John Kane,et al. COVAREP — A collaborative voice analysis repository for speech technologies , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[53] Sitalakshmi Venkatraman,et al. Detecting malicious behaviour using supervised learning algorithms of the function calls , 2013, Int. J. Electron. Secur. Digit. Forensics.
[54] Fernando De la Torre,et al. Facial Expression Analysis , 2011, Visual Analysis of Humans.
[55] Yong Li,et al. Ontology based intelligent information retrieval system , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[56] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[57] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.