Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics
暂无分享,去创建一个
[1] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[2] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[3] Thomas Kunz,et al. Secure Authentication in Wireless Sensor Networks Using RF Fingerprints , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[4] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[5] Jacques Demongeot,et al. Multi-sensors acquisition, data fusion, knowledge mining and alarm triggering in health smart homes for elderly people. , 2002, Comptes rendus biologies.
[6] Peter J. Bickel,et al. The Earth Mover's distance is the Mallows distance: some insights from statistics , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.
[7] Martina Ziefle,et al. Future Care Floor: A Sensitive Floor for Movement Monitoring and Fall Detection in Home Environments , 2010, MobiHealth.
[8] Kent Larson,et al. Activity Recognition in the Home Using Simple and Ubiquitous Sensors , 2004, Pervasive.
[9] Suresh Venkatasubramanian,et al. Radio tomographic imaging and tracking of stationary and moving people via kernel distance , 2013, 2013 ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[10] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[11] Michel Barbeau,et al. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.
[12] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[13] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[14] Marco Gruteser,et al. USENIX Association , 1992 .
[15] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[16] Jianliang Xu,et al. Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2012, IEEE Transactions on Knowledge and Data Engineering.
[17] Gwenn Englebienne,et al. Accurate activity recognition in a home setting , 2008, UbiComp.
[18] JeongGil Ko,et al. Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.
[19] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[20] Richard Harper,et al. The Connected Home: The Future of Domestic Life , 2012 .
[21] Sang Hyuk Son,et al. A comparative study of privacy protection methods for smart home environments , 2013 .
[22] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[23] Yang Xiao,et al. A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID , 2011, Wirel. Commun. Mob. Comput..
[24] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[25] Xiaojiang Du,et al. Lightweight Source Anonymity in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[26] Ilias Maglogiannis,et al. Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[27] Jong Kim,et al. Protecting location privacy using location semantics , 2011, KDD.
[28] E. Campo,et al. WSN-HM: Energy-efficient Wireless Sensor Network for home monitoring , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[29] N. Sriraam,et al. An ubiquitous healthcare system using a wearable shirt for a smart home-a pilot study , 2010, 2010 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES).
[30] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[31] Leonidas J. Guibas,et al. The Earth Mover's Distance as a Metric for Image Retrieval , 2000, International Journal of Computer Vision.
[32] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[33] Wenjing Lou,et al. A new approach for random key pre-distribution in large-scale wireless sensor networks , 2006, Wirel. Commun. Mob. Comput..
[34] Rama Chellappa,et al. Discriminant Analysis for Recognition of Human Face Images (Invited Paper) , 1997, AVBPA.
[35] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[36] Wenyuan Xu,et al. Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[37] David Sánchez,et al. Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines , 2013, Inf. Sci..
[38] Iain MacGill,et al. Coordinated Scheduling of Residential Distributed Energy Resources to Optimize Smart Home Energy Services , 2010, IEEE Transactions on Smart Grid.
[39] Diane J. Cook,et al. Learning Setting-Generalized Activity Models for Smart Spaces , 2012, IEEE Intelligent Systems.
[40] Basel Alomair,et al. Statistical Framework for Source Anonymity in Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[41] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[42] K. Courtney. Privacy and Senior Willingness to Adopt Smart Home Information Technology in Residential Care Facilities , 2008, Methods of Information in Medicine.
[43] David W. Jacobs,et al. Approximate earth mover’s distance in linear time , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.