A survey of security and privacy in big data
暂无分享,去创建一个
Jie Gao | Chen Cheng | Lexi Xu | Xinzhou Cheng | Mingqiang Yuan | Haina Ye | Lexi Xu | Xinzhou Cheng | Mingqiang Yuan | Haina Ye | Chen Cheng | Jie Gao
[1] Zhou Xiaoguang,et al. Challenges and solutions of information security issues in the age of big data , 2016, China Communications.
[2] Jemal H. Abawajy,et al. Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.
[3] Panos Kalnis,et al. Providing K-Anonymity in location based services , 2010, SKDD.
[4] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[5] Li Shuai,et al. Big Data security and privacy: A review , 2014, China Communications.
[6] Ashish Aggarwal,et al. Secure Data Mining in Cloud Using Homomorphic Encryption , 2014, 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[7] Nikos Mamoulis,et al. Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).
[8] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[9] Laks V. S. Lakshmanan,et al. Trajectory anonymity in publishing personal mobility data , 2011, SKDD.
[10] Yue Gao,et al. Differentially private publication of general time-serial trajectory data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[11] Yu Zheng,et al. Trajectory Data Mining , 2015, ACM Trans. Intell. Syst. Technol..
[12] Tao Zhang,et al. A novel Big Data based Telecom Operation architecture , 2016 .
[13] Ranjan K. Mallik,et al. Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.
[14] Xu Jian,et al. A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data , 2014, TrustCom 2014.
[15] Francesco Bonchi,et al. Anonymization of moving objects databases by clustering and perturbation , 2010, Inf. Syst..
[16] Cédric Lauradoux,et al. Time Distortion Anonymization for the Publication of Mobility Data with High Utility , 2015, TrustCom 2015.
[17] Mohammad Ali Nematbakhsh,et al. A Survey on Security Issues in Big Data and NoSQL , 2015 .
[18] Seref Sagiroglu,et al. A survey on security and privacy issues in big data , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[19] Yücel Saygin,et al. Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.
[20] Elisa Bertino,et al. Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.
[21] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[22] K. Premalatha,et al. A survey on privacy preserving data mining , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).
[23] Ken Mano,et al. Pseudonym exchange for privacy-preserving publishing of trajectory data set , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).
[24] Taghi M. Khoshgoftaar,et al. Survey of Clinical Data Mining Applications on Big Data in Health Informatics , 2013, 2013 12th International Conference on Machine Learning and Applications.
[25] Wei Tian,et al. A Survey of Privacy Preserving Data Publishing using Generalization and Suppression , 2014 .
[26] Arumugam Nallanathan,et al. Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game , 2016, IEEE Communications Letters.
[27] Pingshui Wang. A Survey on Privacy Preserving Data Mining , 2009, 2009 First International Workshop on Database Technology and Applications.
[28] Daniel A. Spielman,et al. Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[29] Benjamin C. M. Fung,et al. Differentially Private Trajectory Data Publication , 2011, ArXiv.
[30] Laks V. S. Lakshmanan,et al. Anonymizing moving objects: how to hide a MOB in a crowd? , 2009, EDBT '09.
[31] Peter J. Hunter,et al. Big Data, Big Knowledge: Big Data for Personalized Healthcare , 2015, IEEE Journal of Biomedical and Health Informatics.
[32] Norizan Mohd Yasin,et al. International Journal of Physical Sciences Privacy Preserving Data Publishing: Review , 2022 .
[33] Alvaro A. Cárdenas,et al. Big Data Analytics for Security , 2013, IEEE Security & Privacy.
[34] Elisa Bertino,et al. Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.
[35] Arumugam Nallanathan,et al. Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game , 2016, IEEE Transactions on Communications.
[36] Junqiang Liu. Privacy Preserving Data Publishing: Current Status and New Directions , 2012 .
[37] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[38] Joseph K. Liu,et al. Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.
[39] Claude Castelluccia,et al. Differentially private sequential data publication via variable-length n-grams , 2012, CCS.
[40] Jie Gao,et al. WCDMA data based LTE site selection scheme in LTE deployment , 2016 .
[41] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[42] Jian Xu,et al. A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[43] Spiros Skiadopoulos,et al. Distance-Based k^m-Anonymization of Trajectory Data , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.
[44] Lifeng Wang,et al. Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.