Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing
暂无分享,去创建一个
Xuefeng Liu | Qingqi Pei | Yong Xiang | Lichuan Ma | Yong Xiang | Qingqi Pei | Xuefeng Liu | Lichuan Ma
[1] Hong Zhong,et al. Firework: Big Data Sharing and Processing in Collaborative Edge Environment , 2016, 2016 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).
[2] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[3] Wei Cheng,et al. Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing , 2014, IEEE Transactions on Mobile Computing.
[4] Mohsen Guizani,et al. User privacy and data trustworthiness in mobile crowd sensing , 2015, IEEE Wireless Communications.
[5] Yan Lindsay Sun,et al. Trust Management for Defending On-Off Attacks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[6] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[7] Wen Hu,et al. Are you contributing trustworthy data?: the case for a reputation system in participatory sensing , 2010, MSWIM '10.
[8] E. Massera,et al. On field calibration of an electronic nose for benzene estimation in an urban pollution monitoring scenario , 2008 .
[9] Haojin Zhu,et al. Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks , 2020, IEEE Transactions on Dependable and Secure Computing.
[10] Deborah Estrin,et al. AndWellness: an open mobile system for activity and experience sampling , 2010, Wireless Health.
[11] Qinghua Li,et al. Privacy-aware and trustworthy data aggregation in mobile sensing , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[12] E. Praganavi,et al. EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING , 2017 .
[13] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[14] Xi Fang,et al. Incentive Mechanisms for Crowdsensing: Crowdsourcing With Smartphones , 2016, IEEE/ACM Transactions on Networking.
[15] Aiqing Zhang,et al. Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing , 2017, IEEE Communications Magazine.
[16] Ivan Damgård,et al. Efficient and Secure Comparison for On-Line Auctions , 2007, ACISP.
[17] Sheng Zhong,et al. Efficient and Privacy-Preserving Min and $k$ th Min Computations in Mobile Sensing Systems , 2017, IEEE Transactions on Dependable and Secure Computing.
[18] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[19] Tao Zhang,et al. Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).
[20] Yan Lindsay Sun,et al. Securing Digital Reputation in Online Social Media [Applications Corner] , 2014, IEEE Signal Processing Magazine.
[21] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[22] Xiaodong Lin,et al. A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.
[23] Yi Li,et al. Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks , 2016, IEEE Internet of Things Journal.
[24] Xiaohui Liang,et al. Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.
[25] Deborah Estrin,et al. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research , 2009, MobiSys '09.